首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 43 毫秒
1.
Password-based authenticated key exchange (PAKE) protocols are cryptographic primitives which enable two entities, who only share a memorable password, to identify each other and to communicate over a public unreliable network with a secure session key. In this paper, we propose a simple, efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function. Our protocol is secure against dictionary attacks. Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model.  相似文献   

2.
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.  相似文献   

3.
研究提出了悬索桥索股调整的精确计算方法,该方法可以计入主塔偏位、索股温度的影响。通过弹性悬链线模型推导了悬索桥基准索股的悬链线简化方法。该法对于中跨主缆调整与精确方法、抛物线简化方法相比精度较高,边跨主缆调整与抛物线法精度接近,误差均较大,但也可满足实际工程需要。  相似文献   

4.
悬索桥锚跨索股分析及程序实现   总被引:2,自引:1,他引:1  
针对悬索桥锚跨索股的特点,介绍了索股几何长度迭代计算原理、索力计算模式、索股稳定性判据,并据此编制了FORTRAN数值计算程序,克服了以往悬索桥锚跨索股设计时曾采用的虚交点法导致计算索股与锚面的交点同设计有较大差异的问题;以某在建大型悬索桥为实例进行了锚跨索股分析,得出了相应结论.  相似文献   

5.
A language model for information retrieval is built by using a query language model to generate queries and a document language model to generate documents. The documents are ranked according to the relative entropies of estimated document language models with respect to the estimated query language model. Two popular and relatively efficient smoothing methods, the Jelinek- Mercer method and the absolute discounting method, are used to smooth the document language model in estimation of the document language, A combined model composed of the feedback document language model and the collection language model is used to estimate the query model. A performacne comparison between the new retrieval method and the existing method with feedback is made, and the retrieval performances of the proposed method with the two different smoothing techniques are evaluated on three Text Retrieval Conference (TREC) data sets. Experimental results show that the method is effective and performs better than the basic language modeling approach; moreover, the method using the Jelinek-Mercer technique performs better than that using the absolute discounting technique, and the perfomance is sensitive to the smoothing peramters.  相似文献   

6.
Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiability, which is not provided in the traditional voting. But in the real life, most voters can neither understand the profound theory of cryptography nor perform the complicated cryptographic computation. An e-voting system is presented in this paper to leverage the use of cryptography. It combines the advantages of voting scheme of Moran-Naor and voting scheme based on homomorphic encryption. It makes use of the cryptographic technique, but it hides the details of cryptographic computation from voters. Compared with voting scheme of Moran-Naor, the new system has three advantages: the ballots can be recovered when the voting machine breaks down, the costly cut-and-choose zero-knowledge proofs for shuffling votes made by the voting machine are avoided and the partial tally result in each voting machine can be kept secret. Foundation item: the National Natural Science Foundation of China (No. 60673076) and the National High Technology Research and Development Program (863) of China (No. 2008AA01Z403)  相似文献   

7.
以某斜拉桥拉索火灾事故为背景,通过选取钢绞线拉索过火损伤变量模型,建立该桥的有限元模型进行模拟计算,对拉索火灾前后和换索修复前后斜拉桥的工作性能进行了比较,可为换索施工提供理论依据。  相似文献   

8.
本文简要回顾了语言测试的发展历史和重要阶段,着重分析了从以"托福"测试为代表的结构主义语言测试和以"雅思"为代表的交际语言测试转变的历史原因以及二者的主要特点.文章指出,在我国"托福模式"一统天下的语境中,借鉴吸收"雅思模式"测试优点,对于改革我国外语测试现有模式,促进全民外语素质等方面,具有重要意义.  相似文献   

9.
以三好桥主塔竖转施工为研究对象,应用Sap2000有限元软件建立由塔架、主塔、钢绞线和提升装置组成的有限元模型。通过协调四组提升钢绞线的运动关系,模拟钢绞线均衡平稳地提升大桥主拱并竖转到指定位置。通过仿真分析,确定钢铰线长度、提升过程、塔架受力、提升装置等工艺数据。  相似文献   

10.
可信密码模块是以我国研发的密码算法为基础,结合国内安全需求与产业市场,借鉴国际先进的可信计算技术框架与技术理念自主创新研发的.本文中首先对可信计算平台密码技术方案和国际可信计算组织规范在密码算法、授权协议和密钥管理等几方面进行了比较.基于可信密码模块,提出的基于隐藏属性证书的远程证明方案,用属性证书代替平台配置信息,不仅能有效防止隐私性的暴露,而且可以在系统升级和备份过程中完成可信检测,提高了实现的效率.  相似文献   

11.
阐述了预应力箱梁存在因钢绞线在波纹管内缠绕引发的受力不均匀,而导致梁体出现钢绞线断丝和梁体坍塌等病害的原因,并提出通过疏编穿束的方法解决钢绞线在波纹管内相互缠绕、不均匀受力,从而达到杜绝此类病害发生的目的。  相似文献   

12.
主缆无应力长度的计算是悬索桥上部结构施工监控顺利进行的有效保证.利用通用软件Midas/Civil对涪陵青草背长江大桥建立有限元模型,进而修正索股无应力长度,提出采用通用软件建立悬索桥模型并计算主缆无应力长度的一般方法,为采用该类通用软件计算悬索桥主缆的无应力长度提供参考.  相似文献   

13.
词汇及其搭配知识是语言学习者的核心能力,对自然地道英语的习得至关重要。语料库在词汇学习中的作用主要体现为参考工具与研究工具。基于语料库的自主学习体现了"以人为本"的教育思想,对传统教师角色提出了新的挑战。本文对该学习模式的可行性从人本化的学习理念,培养批判性思维和真实化的学习情景三个方面加以说明。就其有效性则详细论述了自然真实语言的学习,地道词配的系统掌握,语义语用和语域变体特点的准确理解,以及语言规律归纳。并提出了其在硬件设施建设、自我建构意识唤醒、师生之间平衡点找寻等方面的局限性。  相似文献   

14.
多媒体网络教学是高校外语教学改革的重要成就,有巨大的潜力和优势,也有其固有的弊端。多方研究表明,多媒体教学模式成败的关键在于学生是否具备足够的自主学习能力。高校教师在研究多媒体网络教学,开发多媒体教学软件的同时,更应注重培养学生的学习自主性,以充分发挥多媒体网络教学的辅助作用。  相似文献   

15.
In this paper, we present an ontology-based approach for legal provision retrieval. The approach aims at assisting the man who knows little about legal knowledge to inquire appropriate provisions. Legal ontology and legal concept probability model are main functional components in our approach. Legal ontology is extracted from Chinese laws by the natural language processing (NLP) techniques. Legal concept probability model is built from corpus, and the model is used to bridge the gap between legal ontology and natural language inquiries.  相似文献   

16.
通过对S-CAD系统中的S-EL语言的研究背景、设计原理和实现方法的介绍、描述了较为完整的工程语文知识表达模型,并用实例说明了S_EL语文遥应用。该语言包括数据类型,表达式,语法 述等内容,用于表达工程规范和工程专家经验知识,是工程智能CAD系统的重要组成部分。  相似文献   

17.
预应力钢绞线二次张拉技术由于具有很多的优点,越来越多地在悬浇箱梁中得以应用。以文明特大桥主桥连续刚构箱梁竖向预应力钢绞线施工为例,探讨了箱梁竖向预应力铜绞线二次张拉低回缩锚固系统的施工技术,希望能为同类型施工提供有益的参考。  相似文献   

18.
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme.  相似文献   

19.
There were various conventional modeling techniques with varied semantics for system reliability assessment, such as fault trees(FT), Markov process(MP), and Petri nets. However, it is strenuous to construct and to maintain models utilizing these formalisms throughout the life cycle of system under development. This paper proposes a unified formal modeling language to build a general reliability model. The method eliminates the gap between the actual system and reliability model and shows details of the system clearly. Furthermore,the model could be transformed into FT and MP through specific rules defined by a formal language to assess system-level reliability.  相似文献   

20.
一种基于Logistic混沌序列的加密隐藏算法   总被引:2,自引:0,他引:2  
利用混沌序列的随机性和不可预测性,可将其作为密钥进行数据加密.同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性.本文有效地引入信息隐藏方法,提出了基于Logistic混沌序列并将加密与隐藏相结合的算法,防止密文在传送中被监测到,提高了信息的安全性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号