您的位置: 专家智库 > >

上海市自然科学基金(05ZR14083)

作品数:4 被引量:2H指数:1
相关作者:孙迅杨树堂王跃辉陈恭亮李建华更多>>
相关机构:佳木斯大学上海交通大学更多>>
发文基金:上海市自然科学基金国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 4篇自动化与计算...

主题

  • 2篇签名
  • 2篇SECURE
  • 2篇TRUSTE...
  • 1篇签名方案
  • 1篇网络
  • 1篇网络技术
  • 1篇可证明安全
  • 1篇基于身份
  • 1篇安全技术
  • 1篇安全设计
  • 1篇NETWOR...
  • 1篇P2
  • 1篇SCHEME
  • 1篇SCHWAR...
  • 1篇TRUST_...
  • 1篇DWT
  • 1篇ON-LIN...
  • 1篇SELF-S...
  • 1篇MULTI-...
  • 1篇NON-ST...

机构

  • 1篇上海交通大学
  • 1篇佳木斯大学

作者

  • 1篇李建华
  • 1篇陈恭亮
  • 1篇王跃辉
  • 1篇杨树堂
  • 1篇孙迅

传媒

  • 2篇Journa...
  • 1篇上海交通大学...
  • 1篇Wuhan ...

年份

  • 1篇2010
  • 3篇2008
4 条 记 录,以下是 1-4
排序方式:
Efficient and Secure Multi-Signature Scheme Based on Trusted Computing被引量:1
2008年
一个新多签名计划与协议由信任计算(TC ) 支持了的直接匿名的证实(DAA ) 的延期被建议技术。签名人是隐私的分析和模拟结果表演很好与动态匿名,公钥和签名被保护有签名成员,的数字的长度独立人士没有修改公钥,新签名人被允许加入签名,并且秘密关键倾倒或漏引起的攻击能被避免。
HAO LimingYANG ShutangLU SongnianCHEN Gongliang
关键词:安全设计
标准模型下有短公开参数的基于身份签名方案
2008年
针对Chatterjee-Sarkar分等级的基于身份加密(HIBE)方案,提出了一个新的基于身份的签名(IBS)方案,并在标准模型下证明了该方案的安全性.分析表明,该方案的系统公开参数短于标准模型下基于身份的其他签名方案.
孙迅李建华陈恭亮王跃辉杨树堂
关键词:可证明安全
On-line Modeling of Non-stationary Network Traffic with Schwarz Information Criterion
2010年
Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large time-scale. This paper investigates the change of non-stationary self-similarity of network traffic over time,and proposes a method of combining the discrete wavelet transform (DWT) and Schwarz information criterion (SIC) to detect change points of self-similarity in network traffic. The traffic is segmented into pieces around changing points with homogenous characteristics for the Hurst parameter,named local Hurst parameter,and then each piece of network traffic is modeled using fractional Gaussian noise (FGN) model with the local Hurst parameter. The presented experimental performance on data set from the Internet Traffic Archive (ITA) demonstrates that the method is more accurate in describing the non-stationary self-similarity of network traffic.
夏正敏陆松年李建华铁玲
关键词:SELF-SIMILARITY
A Secure Trust Model for P2P Systems Based on Trusted Computing被引量:1
2008年
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%, the service selection failure rate is less than 0.15.
郝黎明杨树堂陆松年陈恭亮
关键词:网络技术安全技术
共1页<1>
聚类工具0