首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   2篇
  国内免费   1篇
无线电   6篇
自动化技术   14篇
  2018年   1篇
  2015年   1篇
  2014年   2篇
  2013年   1篇
  2009年   2篇
  2008年   2篇
  2007年   4篇
  2006年   2篇
  2004年   2篇
  2001年   1篇
  2000年   1篇
  1996年   1篇
排序方式: 共有20条查询结果,搜索用时 15 毫秒
11.
Smartcard上椭圆曲线密码算法的能量攻击和防御   总被引:1,自引:0,他引:1       下载免费PDF全文
能量攻击是一种新的密码攻击方法,其密钥搜索空间要远小于传统的数学分析方法。该文介绍了目前对椭圆曲线密码系统能量攻击的几种攻击方法,提出了一种基于Width-w NAF的改进算法RWNAF(Refined Width-w NAF),该算法通过Masking技术隐藏密码算法的真实能量消耗信息,能有效地防御SPA、DPA、RPA与ZPA攻击;通过对密钥d的奇偶性分析,对预计算表进行优化,减少了存储需求和计算开销。RWNAF与Mamiya提出的WBRIP算法相比,具有相同的抗能量攻击能力,但在计算开销与存储开销上均优于WBRIP方法。  相似文献   
12.
内容保护问题是实现数字内容网上交易的关键问题。传统的组播密钥管理都假设所有合法组用户可以知道组密钥,这种假设对于商业组播是不现实的。该文设计的组播内容保护和支付系统假设智能卡是安全的,所有攻击者包括持卡人都无法获知智能卡中的私钥和组密钥。系统使用最近提出基于身份加密方案,从而避免了公钥证书的使用。系统可以保证数字内容的安全传输,同时具有用户身份认证、内容认证和密钥管理方面的简单性,系统还支持用户的匿名消费。  相似文献   
13.
基于RSA密码系统和安全单向的哈希函数,提出了一种相对安全的远程口令认证方案。采用个人身份识别码(PIN)与智能卡相结合的双因素认证方式,用户不但可以自主选取用户口令,而且还可以根据自身的需要随时更新口令,极大地增强了系统的安全性,提高了系统的认证效率。  相似文献   
14.
针对网格身份认证的需求,提出了一种网格门户网站登录的解决方案.通过使用智能卡以及MyProxy服务器,使用户只需插入智能卡,便可实现自动登录门户网站,同时还可获取实现网格计算所必须的证书信息,从而实现了网格用户的身份认证和安全授权.  相似文献   
15.
With the advancement in internet technologies, the number of servers has increased remarkably to provide more services to the end users. These services are provided over the public channels, which are insecure and susceptible to interception, modification, and deletion. To provide security, registered entities are authenticated and then a session key is established between them to communicate securely. The conventional schemes allow a user to access services only after their independent registration with each desired server in a multiserver system. Therefore, a user must possess multiple smartcards and memorize various identities and passwords for obtaining services from multiple servers. This has led to the adoption of multiserver authentication in which a user accesses services of multiple servers after registering himself at only one central authority. Recently, Kumar and Om discussed a scheme for multiserver environment by using smartcard. Since the user-memorized passwords are of low entropy, it is possible for an attacker to guess them. This paper uses biometric information of user to enhance the security of the scheme by Kumar and Om. Moreover, we conducted rigorous security analyses (informal and formal) in this study to prove the security of the proposed scheme against all known attacks. We also simulated our scheme by using the automated tool, ProVerif, to prove its secrecy and authentication properties. A comparative study of the proposed scheme with the existing related schemes shows its effectiveness.  相似文献   
16.
A new Italian law regarding the recruitment of university researchers and teaching staff provides for election, on a national basis, of the members of the selection committees. In order to handle such a process, an electronic voting system has been developed which offers the necessary guarantees in terms of legitimacy, security, anonymity and secrecy both in the voting process and in the scrutiny. The system presented is based on standard cryptographic algorithms and has been in use by all Italian universities since June 1999.  相似文献   
17.
In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography (ECC), however, none of them provides resilience against different attacks. Therefore, there is a great need to design an efficient scheme for practical applications. In this paper, we proposed such a scheme in order to provide desired security attributes and computation efficiencies. Compared with other existing techniques, our scheme is more efficient and secured. In addition, our scheme is provably secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem.  相似文献   
18.
DPA是最近几年新发现的一种智能卡攻击方法,与以往方法不同,它将加密过程中电路能量消耗与操作数关联,用统计方法来获取密钥信息,危害极大。首先分析了DPA对智能卡常用加密算法的攻击过程,对其原理、步骤、特征和实现进行了深入的剖析;并对AES候选算法的DPA攻击进行了探讨,推论得出,新一代分组加密算法也无法抵御DPA攻击。最后总结了对DPA攻击的几种防范措施。  相似文献   
19.
陈敬学 《中国有线电视》2009,(12):1299-1301
简要介绍设置省市两级CA需要考虑的问题和相应的解决方法,并且结合本地省市两地的Irde-toCAS,验证两级CA方案。  相似文献   
20.
Javacard CPU的设计与实现   总被引:1,自引:0,他引:1       下载免费PDF全文
张德学  郭立  傅忠谦  何力 《计算机工程》2007,33(10):280-282
支持Javacard技术标准是智能卡的发展方向,目前的Javacard系统大多是采用软件虚拟机的方式来解释执行或者通过just-in-time方式执行Java指令,系统软件平台本身占用了大量的资源,且执行效率不高。解决这些问题的方法就是实现硬件Javacard指令处理器。该文给出了一种基于微码的Javacard指令处理器的FPGA设计和实现,以Javacard CPU为核心搭建Javacard CPU测试平台,并将其集成在一块FPGA上实现。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号