encryption相关论文
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme ta......
在计算全息和双随机相位编码技术的基础上,提出了一种虚拟光学加解密算法。该算法采用两路随机相位函数相同但是空间参数不同的双......
在输入面和频谱面上分别放置随机相位加密模板对图像数据进行加密是一种高密级的有效数据加密技术。在研究双随机相位数据加密技术......
The widespread use of mobile devices in digital community has promoted the variety of data collecting methods.However,th......
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
User authentication plays very role in computing system.In this thesis,firstly we studied Smart Card and user authentica......
Biometrics has been incorporated by several organizations as a security authentication feature,with its uniqueness to an......
分析无线局域网近年来的发展特点及其在安全方面存在的不足.针对802.11中安全协议的不足,自主设计开发了嵌入MAC层的802.11自主安......
以广东电网公司2013年费控电能表试点建设为对象,主要介绍了项目组成概况和各子系统结构。重点讲解了项目的安全体系和安全机制,对密......
This paper studies the implementation of bytes multiplication in GF (2 8) based on the Rijndael resource code which ......
Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic
Pulse Doppler (PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially ......
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossi......
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossi......
Function S-rough sets are defined by R-function equivalence class, which have dynamic characteristic. Function S-rough s......
According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth- based au......
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive publ......
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive publ......
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. Howeve......
In this paper,we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map.......
A chaos-based cryptosystem for fractal image coding is proposed.The R’enyi chaotic map is employed to determine the ord......
A chaos-based cryptosystem for fractal image coding is proposed.The R’enyi chaotic map is employed to determine the ord......
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws ......
Quantum-dot cellular automata (QCA) based on cryptography is a new paradigm in the field of nanotechnology. The overall ......
,Design and implementation of various datapath architectures for the ANU lightweight cipher on an FP
Since the dawn of the Inteet of Things (IoT), data and system security has been the major conce for developers.Because m......
In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell state......
In this paper, the security of Electronic Commerce and the security methods are introduced firstly. Then, the history of......
中国石油油气管道SCADA系统存在安全防护及管理相关标准缺失,安全防护技术措施不足等问题,严重威胁国家的能源安全。为此,在充分调......
波分复用系统是将多个独立的光波耦合复用到一根光纤中传输,从而更有效地提供带宽,让IP、ATM、SDH等数据通过统一的光纤层传输的系......
期刊
RSA的安全性是依据大整数分解的困难性而设计的。RSA公开密钥加密体制中n为2个大素数的乘积,即针对n=pq(p,q为大素数)的大整数分解,......
为了解决传统密码系统由于对称特性导致的安全性低的问题,提出了一种新的基于柱面衍射和彩色空间转换的单通道彩色图像加密方法。......
网页防篡改最主要的技术在文件加密保护这个领域,而目前流行水印加密技术已越来越不能满足网页安全需要,同时随着网页内容增加,水......
随着网络技术的高速发展,无线局域网越来越多地在校园中使用,但由于无线网络相比于有线网络的特殊性,对其安全性提出更高的要求。......
系统采用3G网络来改进TCP/IP网络体系的安全,同时采用WAP协议框架中的安全传输协议、安全网关和安全层次以及加强数据传输过程中的......
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one......
Several special properties of Smart and Vercauteren’s encryption scheme are put forward.They are all based on the speci......
Several special properties of Smart and Vercauteren’s encryption scheme are put forward.They are all based on the speci......
为探究吕家坨井田地质构造格局,根据钻孔勘探资料,采用分形理论和趋势面分析方法,研究了井田7......
Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two publ......
为了安全、可靠、有效地传送UWB信号,本文提出了采用蔡氏混沌电路对UWB信号进行加密的技术进行信号的传送,文中首先设计产生可行的......
Traditional encryption techniques have some limits for multimedia information, especially image and video, which are con......
分布式数据库系统中各服务器之间、服务器和客户机之间一般通过开放的网络环境互联。网络环境和数据库系统成为恶意用户攻击破坏的......
本文依据目前无线网络的广泛应用与发展,分析了无线局域网面临的安全威胁,针对无线局域网的技术标准,在无线局域网中可能使用的加......
In this article, based on Chatterjee-Sarkar hierarchical identity-based encryption (HIBE), a novel identity-based encryp......
Security video communication is a challenging task,especially for wireless video applications.An efficient security mult......
提出一种基于有理Bézier曲面生成组合混沌映射的图像加密算法.首先通过秘钥序列生成多个Logistic混沌系统的初值,进而生成多个混......
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to en......
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al.,2006) and reports ......
An ethernet-passive-optical-network consists of one optical-line-terminator and multiple optical-network-units oith pass......
期刊
SSL技术在互联网安全通信领域应用广泛,尤其近年来电子商务发展迅速,SSL协议由于可以提供网络信息的安全传输,受到了广大电子网站......