首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   1篇
  国内免费   3篇
电工技术   2篇
综合类   1篇
建筑科学   1篇
无线电   4篇
一般工业技术   2篇
冶金工业   1篇
自动化技术   4篇
  2022年   2篇
  2021年   1篇
  2019年   1篇
  2018年   1篇
  2012年   1篇
  2009年   1篇
  2007年   1篇
  2006年   2篇
  2004年   2篇
  2003年   2篇
  1999年   1篇
排序方式: 共有15条查询结果,搜索用时 15 毫秒
1.
A telecare medicine information system (TMIS) helps in providing an efficient communication platform to patients from home to consult doctors at a clinical center. In TMIS, the patient's confidentiality, security, and mutual authentication are very crucial; so remote authentication plays a vital role for verifying the legitimacy of patients. Recently, Amin and Biswas have devised a remote authentication protocol for TMIS, claiming it to be secured from various malicious vulnerabilities. We examine this protocol and find that it is not able to withstand many attacks that include off‐line and online password‐guessing, identity‐guessing, user impersonation, privileged insider, and known session key temporary information attacks. We propose a 3‐factor–based authentication protocol for TMIS by overcoming these security shortcomings. We present its security verification in formal and informal ways, which assert its resistivity against various security threats. We use the Burrows‐Abadi‐Needham logic for validating it, and with the Automated Validation of Internet Security Protocols and Applications tool, it is simulated. Further, the performance evaluation and the security functionalities justify high degree of security with efficient complexity.  相似文献   
2.
With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks and challenges to patients' and the server's confidentiality, integrity and security. In order to avoid any resource abuse and malicious attack, employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the server. Therefore, several authentication protocols have been proposed to this end. Very recently, Chaudhry et al. identified that there are vulnerabilities of impersonation attacks in Islam et al.'s scheme. Therefore, they introduced an improved protocol to mitigate those security flaws. Later, Qiu et al. proved that these schemes are vulnerable to the man-in-the-middle, impersonation and offline password guessing attacks. Thus, they introduced an improved scheme based on the fuzzy verifier techniques, which overcome all the security flaws of Chaudhry et al.'s scheme. However, there are still some security flaws in Qiu et al.'s protocol. In this article, we prove that Qiu et al.'s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation attacks. Therefore, we introduce an improved protocol for authentication, which reduces all the security flaws of Qiu et al.'s protocol. We also make a comparison of our protocol with related protocols, which shows that our introduced protocol is more secure and efficient than previous protocols.  相似文献   
3.
铁路信息化建设的核心——TMIS   总被引:1,自引:0,他引:1  
铁路货运管理信息系统(TMIS)是铁路信息化建设的核心.本文将围绕TMIS简单介绍铁路信息化建设的进展及今后发展趋势.  相似文献   
4.
本文介绍了全路统一TMIS传输平台的总体设计与实现.主要包括结构设计.功能设计.应用接口设计.日志处理以及新旧系统兼容及切换等方面的内容。  相似文献   
5.
针对目前国家电网公司传输网网络管理存在各设备厂家网管相互孤立,通信基础信息资源无法共享,无法实现网络设备、电路等资源集中管理、调度及维护的现状,提出了“十一五”期间国家电网公司网络管理建设的目标和解决方法。“十一五”期间传输网络管理需建设传输综合网络管理系统,该系统功能包括:综合监视、资源动态管理及T-M IS等功能,实现对传输网络全网资源的集中管理、设备的集中维护、电路调度的跨厂家调度,为网络优化提供强有力的支撑。此外,T-M IS子系统可提供的工单管理、值班日志管理、运行报表管理等功能能够极大地方便运维人员的日常维护,更好地实现网络运维的信息化发展。  相似文献   
6.
提出了构建基于光以太网的铁路管理信息传输平台方案。讨论了光以太网的业务特点及实现。根据铁路通信网的特点,提出把铁路局范围的通信网当成城域网处理,并据此采用EoS技术设计构造一专业部门路局范围内的局域网。  相似文献   
7.
铁路专用通信网为各业务的网络信息系统提供通道,各业务的网络系统建设的不同步、占用带宽不等导致通道重复申请、重复计费。从各系统的功能出发探讨沈阳铁路局专用通信网整合的可行性与整合方案。  相似文献   
8.
The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks like spoofing, replay, Masquerade, and stealing of stored templates. In this article, we propose a new cancelable biometric approach which has tentatively been named as “Expression Hash” for Telecare Medical Information Systems. The idea is to hash the expression templates with a set of pseudo-random keys which would provide a unique code (expression hash). This code can then be serving as a template for verification. Different expressions would result in different sets of expression hash codes, which could be used in different applications and for different roles of each individual. The templates are stored on the server-side and the processing is also performed on the server-side. The proposed technique is a multi-factor authentication system and provides advantages like enhanced privacy and security without the need for multiple biometric devices. In the case of compromise, the existing code can be revoked and can be directly replaced by a new set of expression hash code. The well-known JAFFE (The Japanese Female Facial Expression) dataset has been for empirical testing and the results advocate for the efficacy of the proposed approach.  相似文献   
9.
本文对铁路指挥调度中心综合布线所涉及的系统、对综合布线系统的要求,以及综合布线系统的设计等进行了介绍。  相似文献   
10.
惠舒清 《包钢科技》2006,32(4):32-34
通过对包神铁路车号自动识别系统(ATIS)与铁路运输管理系统(TMIS)有机地结合分析,介绍了车号扫描在地方铁路现在车管理方面的应用;并指出了系统间的工作模式.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号