期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
3GPP2增强型用户加密(ESP)机制研究
1
作者 汪青山 李伟 《电信交换》 2008年第2期22-25,31,共5页
ESP是3GPP2提出的关于3G的重要无线链路域数据加密机制。它是基于Rijndael算法而设计的。但是,目前关于ESP的研究还不够深入,尤其是随机参数fresh的应用、设置等问题还有待于进一步的商榷。本文较为详细地剖析了ESP的操作流程和基本... ESP是3GPP2提出的关于3G的重要无线链路域数据加密机制。它是基于Rijndael算法而设计的。但是,目前关于ESP的研究还不够深入,尤其是随机参数fresh的应用、设置等问题还有待于进一步的商榷。本文较为详细地剖析了ESP的操作流程和基本原理,分析了参数fresh的设置对系统密码块随机性能可能的影响。 展开更多
关键词 3GPP2 增强型用户加密 密码块 随机性
在线阅读 下载PDF
X系统交换机用户加密限制呼出功能的改进方法
2
作者 彭俊 陈三军 《铁道通信信号》 1998年第9期25-26,共2页
1用户加密限制呼出功能(SOB)的用法具有该功能的用户可通过话机按键对任意呼叫类型进行限制,如需取消某项限制呼出功能,则必须使用该用户设置的密码,否则无法取消。这一功能可防止其他人利用其话机或并线盗打电话。用户话机按... 1用户加密限制呼出功能(SOB)的用法具有该功能的用户可通过话机按键对任意呼叫类型进行限制,如需取消某项限制呼出功能,则必须使用该用户设置的密码,否则无法取消。这一功能可防止其他人利用其话机或并线盗打电话。用户话机按键操作如下。1.“*34(X)#”... 展开更多
关键词 X系统交换机 限制呼出功能 用户加密 交换机
在线阅读 下载PDF
基于超混沌系统的多权限多图像加密算法 被引量:1
3
作者 白牡丹 李珊珊 张泽坤 《计算机系统应用》 2023年第5期141-148,共8页
为有效改善多图像加密质量及其对数据传输的安全性,提出一种基于超混沌系统的多权限多图像加密算法.首先,将L幅明文图像分别进行分段线性混沌映射(piece-wise linear chaotic map,PWLCM)的双层交叉耦合操作,并通过异或进行合并得到类噪... 为有效改善多图像加密质量及其对数据传输的安全性,提出一种基于超混沌系统的多权限多图像加密算法.首先,将L幅明文图像分别进行分段线性混沌映射(piece-wise linear chaotic map,PWLCM)的双层交叉耦合操作,并通过异或进行合并得到类噪声图像;接着,采用最低有效位嵌入算法将类噪声图像嵌入到第L+1幅明文图像信息中,得到半加密图像;最后,通过结合一维的cubic映射和一维帐篷映射,产生一个二维cubic-帐篷混沌映射(two-dimensional cubic-tent modular map,2D-CTMM),利用其对半加密图像扩散后进行双层阶梯置乱,得到密文图像.实验结果表明:所提方法对明文以及密钥十分敏感,密钥空间大,可以有效抵御统计攻击和差分攻击,并且该算法在保证安全性的前提下,实现了用户多权限解密以及用户部分解密工作. 展开更多
关键词 多图像加密 分段线性混沌映射(PWLCM) 多权限用户加密 部分解密 扩散 混沌系统
在线阅读 下载PDF
网上在线结算
4
《网上出版》 1997年第2期28-29,共2页
网上实现在线结算是随国际互联网的迅猛发展而产生的一种新的结算方式。因它的方便、快捷受到了国际互联网用户的广泛欢迎,迅速在世界范围内流行开来。网上在线结算服务于以下几个国际互联网服务项目:一、Internet使用费在线结算。Inter... 网上实现在线结算是随国际互联网的迅猛发展而产生的一种新的结算方式。因它的方便、快捷受到了国际互联网用户的广泛欢迎,迅速在世界范围内流行开来。网上在线结算服务于以下几个国际互联网服务项目:一、Internet使用费在线结算。Internet使用费的交纳方式一直是困扰各ISP的问题。 展开更多
关键词 网上在线 互联网络 用户加密 服务器 使用费 网上购物 电子购物 公钥 网上游戏 饭店 服务设施 在线支付 在线预订
在线阅读 下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
5
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
6
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
在线阅读 下载PDF
消防监督管理信息系统的应用研究 被引量:4
7
作者 李东朋 谢鹍 《消防技术与产品信息》 2009年第6期27-31,共5页
利用动态服务器网页编程技术(ASP)及微软存取数据库技术,设计了消防监督管理电子信息远程服务系统的用户控制子系统。该子系统提供了整套系统对用户访问权限控制、用户信息注册、用户信息加密、用户分级管理等功能的实现,同时为系统的... 利用动态服务器网页编程技术(ASP)及微软存取数据库技术,设计了消防监督管理电子信息远程服务系统的用户控制子系统。该子系统提供了整套系统对用户访问权限控制、用户信息注册、用户信息加密、用户分级管理等功能的实现,同时为系统的有偿使用预留了程序接口,方便今后系统的升级。 展开更多
关键词 消防监督管理 信息远程服务 用户权限 用户加密
原文传递
用C语言实现文件加解密
8
作者 杨海波 江兵 《重庆通信学院学报》 1994年第1期14-16,共3页
利用C语言中提供的位操作符来实现文件的加解密,并根据不同需要提供了自动加密和用户加密两种方式。
关键词 C语言 文件加解密 自动加密 用户加密 计算机
全文增补中
ImgFS: a transparent cryptography for stored images using a filesystem in userspace 被引量:4
9
作者 Osama A. KHASHAN Abdullah M. ZIN Elankovan A. SUNDARARAJAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第1期28-42,共15页
Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional software encryption applications generally suffered from t... Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional software encryption applications generally suffered from the expense of user con- venience, performance efficiency, and the level of security provided. To overcome these limitations, the concept of transparent encryption has been proposed. This type of encryption mechanism can be implemented most efficiently with kernel file systems. However, this approach has some disadvantages since developing a new file system and attaching it in the kernel level requires a deep understanding of the kernel internal data structure. A filesystem in userspace (FUSE) can be used to bridge the gap. Never- theless, ctwrent implementations of cryptographic FUSE-based file systems suffered from several weaknesses that make them less than ideal for deployment. This paper describes the design and implementation of ImgFS, a fully transparent cryptographic file system that resides on user space. ImgFS can provide a sophisticated way to access, manage, and monitor all encryption and key management operations for image files stored on the local disk without any interaction from the user. The development of ImgFS has managed to solve weaknesses that have been identified on cryptographic FUSE-based implementations. Experiments were carried out to measure the performance of ImgFS over image files' read and write against the cryptographic service, and the results indicated that while ImgFS has managed to provide higher level of security and transparency, its performance was competitive with other established cryptographic FUSE-based schemes of high performance. 展开更多
关键词 Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部