排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
The security of wireless local area network (WLAN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEE802.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WLAN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 相似文献
2.
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme. 相似文献
3.
4.
《上海交通大学学报(英文版)》1996,(1)
ANIMPROVEDSCHEMEFORAPKCSBASEDONTHEPRMETHODJiangZhiping(AutomationDepartment)XieKanglin(ComputerScience&EngineeringDepartment)... 相似文献
5.
背包公钥密码体制是第一个公钥体制,其攻击算法是NP完全问题.首先对背包问题和背包公钥体制进行了描述,然后给出了2种破译Merkle-Hellman背包加密方案DNA计算模型,即分步排除法和二分法,分步排除法是一种基本算法,二分法对分步排除法进行了改进,提高了破译背包密码的效率. 相似文献
6.
Introduction Anadhocnetworkisacollectionofau-tonomousnodesthatcommunicatewitheachother byformingamulti-hopwirelessnetwork.The propertyofnotrelyingonthesupportfromany fixedinfrastructuremakesitusefulforawide rangeofapplications,suchasinstantconsultation betweenmobileusersinthebattlefields,emergen-cy,anddisastersituations,wheregeographicalor terrestrialconstraintsdemandtotallydistributed networks.Whileadhocnetworkprovidesagreat flexibilityforestablishingcommunications,italso bringsalotofresearch… 相似文献
7.
Introduction Multisignature is a joint signature generated by agroup of signers. The group has a security policy thatrequires a multisignature to be signed by all groupmembers with the knowledge of multiple privatekeys. Digital multisignatures should have… 相似文献
8.
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 相似文献
9.
于功弟 《西南交通大学学报》1993,6(2):105-112
本文在已研制的背包间题密码系统的基础上,对整个算法从理论上、方法上进行了进
一步修改完善,并对整个密码算法的原理、应用和安全性进行了论证.这种密码系统
是建立在传统密码学和公开密钥密码体制的基础之上,它既可实现保密性又可保持
真实性,特别适于作为计算机信息的通用加密工具。 相似文献
10.
How to Play E-Lottery Games via Voting 总被引:1,自引:0,他引:1
Introduction Lotteryisapopulargameintherealworld.Howtoplayalotteryincyberspacehasreceived muchattention.E-lotteryisconvenientsinceplay-erscanpurchasethetickets,andobservethegen-erationoftheluckynumberovertheInternet.Manymethodstoprovidee-lotteryservicehave beenproposedintheliteratureinRefs.[1-6].The mainideaistousedelayingfunctionorweaklyse-cretbitcommitment(WSBC)tokeepthewinning numbersecretbeforethescheduledclosingtime.Inmoste-lotteryschemesaplayerpresentsaseed numberinhisticket.Thelucky… 相似文献