首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
公路运输   1篇
综合类   9篇
铁路运输   1篇
  2009年   1篇
  2008年   1篇
  2007年   2篇
  2006年   4篇
  2005年   1篇
  1996年   1篇
  1993年   1篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem   总被引:1,自引:0,他引:1  
The security of wireless local area network (WLAN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEE802.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WLAN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.  相似文献   
2.
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme.  相似文献   
3.
一种新的广义动态密钥托管方案   总被引:1,自引:0,他引:1  
闫鸿滨  袁丁  党怀义 《铁道学报》2006,28(5):104-107
文章基于ElGamal公钥体制,利用单向函数不可求逆的安全特性,提出一个动态密钥托管方案,可使用于任意接入结构。与已有的其他密钥托管方案相比,它具有以下优点:(1)每个托管代理者的子密钥可以多次使用;(2)如果某个托管代理者的子密钥泄露,系统只需为它重新分配子密钥,而不必更改其他成员的子密钥;(3)系统可以很方便地增加、删除托管代理成员。该方案不但可以验证托管内容的有效性,确认欺骗者,保证了托管代理子密钥的安全性;而且提高了密钥托管的动态性和灵活性。  相似文献   
4.
ANIMPROVEDSCHEMEFORAPKCSBASEDONTHEPRMETHODJiangZhiping(AutomationDepartment)XieKanglin(ComputerScience&EngineeringDepartment)...  相似文献   
5.
背包公钥密码体制是第一个公钥体制,其攻击算法是NP完全问题.首先对背包问题和背包公钥体制进行了描述,然后给出了2种破译Merkle-Hellman背包加密方案DNA计算模型,即分步排除法和二分法,分步排除法是一种基本算法,二分法对分步排除法进行了改进,提高了破译背包密码的效率.  相似文献   
6.
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks   总被引:3,自引:0,他引:3  
Introduction Anadhocnetworkisacollectionofau-tonomousnodesthatcommunicatewitheachother byformingamulti-hopwirelessnetwork.The propertyofnotrelyingonthesupportfromany fixedinfrastructuremakesitusefulforawide rangeofapplications,suchasinstantconsultation betweenmobileusersinthebattlefields,emergen-cy,anddisastersituations,wheregeographicalor terrestrialconstraintsdemandtotallydistributed networks.Whileadhocnetworkprovidesagreat flexibilityforestablishingcommunications,italso bringsalotofresearch…  相似文献   
7.
Introduction Multisignature is a joint signature generated by agroup of signers. The group has a security policy thatrequires a multisignature to be signed by all groupmembers with the knowledge of multiple privatekeys. Digital multisignatures should have…  相似文献   
8.
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure.  相似文献   
9.
本文在已研制的背包间题密码系统的基础上,对整个算法从理论上、方法上进行了进 一步修改完善,并对整个密码算法的原理、应用和安全性进行了论证.这种密码系统 是建立在传统密码学和公开密钥密码体制的基础之上,它既可实现保密性又可保持 真实性,特别适于作为计算机信息的通用加密工具。   相似文献   
10.
How to Play E-Lottery Games via Voting   总被引:1,自引:0,他引:1  
Introduction Lotteryisapopulargameintherealworld.Howtoplayalotteryincyberspacehasreceived muchattention.E-lotteryisconvenientsinceplay-erscanpurchasethetickets,andobservethegen-erationoftheluckynumberovertheInternet.Manymethodstoprovidee-lotteryservicehave beenproposedintheliteratureinRefs.[1-6].The mainideaistousedelayingfunctionorweaklyse-cretbitcommitment(WSBC)tokeepthewinning numbersecretbeforethescheduledclosingtime.Inmoste-lotteryschemesaplayerpresentsaseed numberinhisticket.Thelucky…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号