期刊文献+
共找到2,282篇文章
< 1 2 115 >
每页显示 20 50 100
Event-Triggered Differentially Private Average Consensus for Multi-agent Network 被引量:15
1
作者 Aijuan Wang Xiaofeng Liao Haibo He 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期75-83,共9页
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu... This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis. 展开更多
关键词 Average consensus differentially private event-triggered communication multi-agent network systems (MANSs)
在线阅读 下载PDF
Security Risk Prevention and Control Deployment for 5G Private Industrial Networks 被引量:4
2
作者 Wenfa Yan Qin Shu Peng Gao 《China Communications》 SCIE CSCD 2021年第9期167-174,共8页
In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application o... In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed. 展开更多
关键词 5G private network network security security risk prevention and control
在线阅读 下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:3
3
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol Security Virtual private network Video Conferencing Voice over Internet Protocol JITTER End to End Delay
在线阅读 下载PDF
Effective and Extensive Virtual Private Network
4
作者 Tarek S. Sobh Yasser Aly 《Journal of Information Security》 2011年第1期39-49,共11页
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh... A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment. 展开更多
关键词 VIRTUAL private network network Security SECURE Data Transmission
在线阅读 下载PDF
Investigation and Analysis on the Status Quo of College Students’Network Entrepreneurship in Private University
5
作者 Shaohong Chen Chao Zhang Lingling Dai 《Journal of Contemporary Educational Research》 2022年第8期81-90,共10页
This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important... This year,the number college graduates in China surpassed tens of millions for the first time.The employment rate of fresh graduates has been concerning.In view of this,network entrepreneurship has become an important channel and platform to solve the problem of college students’employment.The government,society and universities has been actively encouraging college students'network entrepreneurship as the value of college students'network entrepreneurship is significant.This paper analyzes the current situation of college students'network entrepreneurship and the problems faced through the survey data and thus suggests corresponding countermeasures. 展开更多
关键词 private university College students network entrepreneurship Suggestions
在线阅读 下载PDF
区块链赋能智能电网中的语义感知实体分类方法
6
作者 苏冰 王睿 +3 位作者 尹骋宇 刘新 刘怡良 刘冬兰 《移动通信》 2026年第1期120-131,共12页
随着智能电网数字化转型,5G电力专网和区块链技术的引入推动智能电网向去中心化架构演进。然而,由于区块链数据具有匿名性、实体呈现异构多样化特征,传统的实体分类技术在区块链赋能的智能电网场景中表现出分类精度不足的问题。基于此,... 随着智能电网数字化转型,5G电力专网和区块链技术的引入推动智能电网向去中心化架构演进。然而,由于区块链数据具有匿名性、实体呈现异构多样化特征,传统的实体分类技术在区块链赋能的智能电网场景中表现出分类精度不足的问题。基于此,提出了一种面向区块链赋能智能电网的语义感知实体分类方法,通过挖掘和利用区块链及通信数据中的语义信息,以提升实体特征识别与分类能力。实验结果表明,相较于传统方法,该方法在分类性能上实现了显著提升,为区块链赋能智能电网的安全与可靠运行提供了有力的技术支撑。 展开更多
关键词 智能电网 5G电力专网 区块链 实体分类
在线阅读 下载PDF
PIR-based data integrity verification method in sensor network
7
作者 Yong-Ki Kim Kwangnam Choi +1 位作者 Jaesoo Kim JungHo Seok 《Journal of Central South University》 SCIE EI CAS 2014年第10期3883-3888,共6页
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ... Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation. 展开更多
关键词 data integrity VERIFICATION private information retrieval sensor network
在线阅读 下载PDF
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
8
作者 Hossein Fereidooni Hassan Taheri Mehran Mahramian 《International Journal of Communications, Network and System Sciences》 2012年第4期228-237,共10页
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi... Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats. 展开更多
关键词 Virtual private networks (VPNs) Public KEY Infrastructure Authentication Internet KEY Exchange (IKE) BAN-Logic
在线阅读 下载PDF
STUDY ON NEIGHBORHOOD DISCOVERY PROTOCOL IN COMMUNICATION NETWORKSGRANULAR SLUDGE BY BATCH TESTS
9
作者 SHI Cheng-ge 《Journal of Shanghai Jiaotong university(Science)》 EI 2001年第1期56-61,共6页
One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed ob... One algorithm and one method for PNNI(Private Network to Network Interface) routing were presented. The algorithm is OIL (Older Is Leader) algorithms for Peer Group selection, and the method is the DOO (Distributed object-oriented) method for HDOS (Hierarchy Distributed-Object System), PNNI systems and IP(Internet Protocol) networks. Based on the specifications from ATM forum, and the creative ideas from Distributed System realization, this paper studies and analyzes the private ATM network environment. The OIL algorithm and the DOO method are both for PNNI routing protocol. Through the PNNI simulation, the availability and robustness are proved for the above two improvements. 展开更多
关键词 OIL algorithm DOO method PNNI routing Hello protocol private ATM network HDOS
在线阅读 下载PDF
STUDY ON NEIGHBORHOOD DISCOVERY PROTOCOL IN COMMUNICATION NETWORKS
10
作者 时成阁 王思兵 +1 位作者 胡家骏 HU Jia-jun 《Journal of Shanghai Jiaotong university(Science)》 EI 2001年第1期52-55,共4页
A fuzzy requirement based strategy for QoS service in broadband networks was presented. With the analysis of QoS service in ATM networks and broadband IP networks, it gave a requirement based strategy for QoS service... A fuzzy requirement based strategy for QoS service in broadband networks was presented. With the analysis of QoS service in ATM networks and broadband IP networks, it gave a requirement based strategy for QoS service application with Fuzzy language evaluation principles. The requirement parameters are chosen according to the WANT/COST rule, and a fuzzy set is constructed to realize the fuzzy determinant. The simulation results show that it is useful to evaluate the QoS service in broadband networks, and to effectively simplify the access protocols and solve the billing issues in broadband networks. 展开更多
关键词 OIL algorithm DOO method PNNI routing Hello protocol private ATM network HDOS
在线阅读 下载PDF
面向智能电网的5G-A确定性网络技术研究 被引量:3
11
作者 汪保友 姚赛彬 郭文浩 《邮电设计技术》 2025年第2期64-70,共7页
面向智能电网超低时延、超大带宽、超精授时和超强安全的确定性网络的通信需求,提出SMART综合解决方案。该方案融合了网络切片、MEC边缘计算、3CC载波聚合、RedCap轻量化5G、TSN时间敏感网络等技术。通过综合运用5G/5G-A先进无线技术,... 面向智能电网超低时延、超大带宽、超精授时和超强安全的确定性网络的通信需求,提出SMART综合解决方案。该方案融合了网络切片、MEC边缘计算、3CC载波聚合、RedCap轻量化5G、TSN时间敏感网络等技术。通过综合运用5G/5G-A先进无线技术,为智能电网打造定制化资源与服务质量保障兼备的精品网络解决方案。该方案支持业务隔离机制,能更精准地满足电网业务对安全性、可靠性和灵活性的严格要求,实现差异化服务保障,助力智能电网的高效稳定运行。 展开更多
关键词 智能电网 5G专网 5G-A 无线通信 确定性网络
在线阅读 下载PDF
5G双域专网解决方案研究 被引量:3
12
作者 刘洋 《无线互联科技》 2025年第5期94-97,共4页
为了解决ULCL方案无法支持漫游和回落4G接入的不足,文章研究并设计了一种以多数据网络名称(Data Network Name, DMN)为基础的5G双域专网分流解决方案。该方案主要在SMF的支持下执行专用DNN会话的创建任务并有效发挥分流规则的约束作用,... 为了解决ULCL方案无法支持漫游和回落4G接入的不足,文章研究并设计了一种以多数据网络名称(Data Network Name, DMN)为基础的5G双域专网分流解决方案。该方案主要在SMF的支持下执行专用DNN会话的创建任务并有效发挥分流规则的约束作用,通过UPF向不同会话锚点对专网和公网流量进行分流,以此实现二者之间的顺畅高效切换。应用效果表明,该方案不仅能够有效支持基于漫游接入的专网与公网分流,还可以在回落至4G网络场景之时实现用户高速接入,具有较理想的应用价值。 展开更多
关键词 5G双域专网 分流 多DNN 专网 公网
在线阅读 下载PDF
5G通信中的多频段毫米波信道高吞吐量跟踪方法 被引量:3
13
作者 唐婧 彭春富 赵武初 《计算机测量与控制》 2025年第2期137-142,共6页
5G通信系统中,毫米波通信主机吞吐量不达标会影响通信设备在信道组织内对信息参量的分配能力,从而使得毫米波主机在原通信节点处无法实现对预设信道组织的准确跟踪;为解决5G通信中的多频段毫米波信道准确跟踪问题,研究了5G专网的多频段... 5G通信系统中,毫米波通信主机吞吐量不达标会影响通信设备在信道组织内对信息参量的分配能力,从而使得毫米波主机在原通信节点处无法实现对预设信道组织的准确跟踪;为解决5G通信中的多频段毫米波信道准确跟踪问题,研究了5G专网的多频段毫米波信道高吞吐量跟踪方法;设计多频段通信谐振器,通过设置合理的通信位置,优化谐振器的布局,并在毫米波滤波器中,解析多频段通信谐振器中的毫米波通信数据,通过赋予不同通信数据不同权重指标的方式,进行多频段目标通信频段匹配;由此,通过信道矩阵和IRS反射元对基站的调整,动态地改变信号的传播路径和特性,优化毫米波信道目标吞吐量,完成5G通信中的多频段毫米波信道跟踪;实验结果表明,应用上述方法跟踪毫米波信道组织的过程中,通信主机吞吐量达标,符合在信道组织内精准分配信息参量、实现信道准确跟踪的应用需求。 展开更多
关键词 5G专网 毫米波信道跟踪 多频段通信谐振器 毫米波滤波器 信道矩阵 IRS反射元
在线阅读 下载PDF
公私法一体化视野下网络平台法律义务的完善
14
作者 杨清望 王海英 《西安交通大学学报(社会科学版)》 北大核心 2025年第4期144-157,共14页
探讨网络平台法律义务的完善,旨在回应数字时代法律义务基础和义务内容应如何发展的问题。中国网络平台法律义务的设定存在理论基础研究不深入、相关法律规定内容分散且缺乏协调性、义务内容缺乏差异性等问题,需要通过设定公私法一体化... 探讨网络平台法律义务的完善,旨在回应数字时代法律义务基础和义务内容应如何发展的问题。中国网络平台法律义务的设定存在理论基础研究不深入、相关法律规定内容分散且缺乏协调性、义务内容缺乏差异性等问题,需要通过设定公私法一体化义务予以消解。设定上述义务应以共同善义务观为基本遵循,坚持网络平台法律义务的公私二重性,从义务规则体系、义务内容、义务类型化等方面予以完善。具言之,应以“基础法—领域法—特别法”体系优化网络平台义务规则体系;搭建个体民事权利和基本权利保护义务、公共利益保护义务和共同体秩序维护义务的多层级义务框架;根据网络平台地位的不同,设定平台的一般化义务和特别化义务;借助转介条款并明确网络平台第三方监管义务的范围以消解公私法义务的冲突。 展开更多
关键词 网络平台治理 网络平台法律义务 公私法一体化 共同善义务观 基本权利保护义务 转介条款
在线阅读 下载PDF
基于新型城域网构建教育专网的应用
15
作者 郭泓伟 《江苏通信》 2025年第3期34-37,49,共5页
本应用以新型城域网为基础,结合网络切片、随流检测等“IPv6+”新技术构建了新型教育专网,其在关键业务保障、可视化运维、安全防护等能力方面均得到有效提升,可满足教育信息化水平不断深入推进的要求。同时,以教育专网应用形成的切片... 本应用以新型城域网为基础,结合网络切片、随流检测等“IPv6+”新技术构建了新型教育专网,其在关键业务保障、可视化运维、安全防护等能力方面均得到有效提升,可满足教育信息化水平不断深入推进的要求。同时,以教育专网应用形成的切片专网解决方案实现了新型城域网端到端网络切片能力输出,可大幅降低行业专网建设与运维成本,支撑各行业的数字化转型。 展开更多
关键词 教育专网 IPv6+ 网络切片 随流检测 新型城域网
在线阅读 下载PDF
5G专网场景下的DPI部署方案研究
16
作者 文涛 谭蓓 《邮电设计技术》 2025年第2期37-41,共5页
随着5G专网的日益普及,越来越多的行业客户提出了5G专网场景下的DPI部署需求,期望通过部署DPI实现更精准的网络维护优化以及终端业务控制。在分析DPI架构及5G专网架构的基础上,结合5G专网客户的典型DPI需求,提出了5G专网场景下的DPI部... 随着5G专网的日益普及,越来越多的行业客户提出了5G专网场景下的DPI部署需求,期望通过部署DPI实现更精准的网络维护优化以及终端业务控制。在分析DPI架构及5G专网架构的基础上,结合5G专网客户的典型DPI需求,提出了5G专网场景下的DPI部署建议。 展开更多
关键词 5G专网 DPI部署 XDR 业务识别 策略控制
在线阅读 下载PDF
公安无线通信专网宽窄带融合应用研究
17
作者 王长杰 《青岛远洋船员职业学院学报》 2025年第3期45-49,共5页
随着公安工作对图像、视频等多媒体信息上传和下推需求的不断增强,宽窄带融合是当前公安无线专网发展的最佳选择。基于对公安无线通信专网发展模式及技术路线的分析,从设备、网络、应用三个方面提出了宽窄带融合系统构建方案,实现了在... 随着公安工作对图像、视频等多媒体信息上传和下推需求的不断增强,宽窄带融合是当前公安无线专网发展的最佳选择。基于对公安无线通信专网发展模式及技术路线的分析,从设备、网络、应用三个方面提出了宽窄带融合系统构建方案,实现了在硬件、软件和管理调度方面的融合,探索了宽窄带融合专网在公安工作中的具体应用。 展开更多
关键词 公安专网 无线通信 宽窄带融合
在线阅读 下载PDF
数字时代的国家安全探析
18
作者 邱静 《电子科技大学学报(社科版)》 2025年第2期20-34,共15页
随着网络普及和数字技术兴起,全球进入数字时代,对国家管理、企业发展和个人生活带来了深远影响。数字安全作为国家安全的重要组成部分,主要包括网络空间安全、数据安全、数字应用技术安全、平台舆论安全以及数字企业私权力引发的安全... 随着网络普及和数字技术兴起,全球进入数字时代,对国家管理、企业发展和个人生活带来了深远影响。数字安全作为国家安全的重要组成部分,主要包括网络空间安全、数据安全、数字应用技术安全、平台舆论安全以及数字企业私权力引发的安全问题。不少国家和地区采取了应对措施,以降低数字领域的安全风险。数字安全具有国家安全的一般性特点,例如,数字安全问题的识别和认定具有政治性,数字安全具有系统性、相对性和层次性等特点;需要有效平衡数字安全与发展、数字安全与个人权利之间的关系。同时,数字安全具有较为鲜明的特征,如数字领域技术性强,具有较大不确定性,安全问题十分复杂;数字安全治理涉及多个主体,私主体的重要性日益凸显;数字时代推动形成新的权力,数字安全具有较强的政治属性、社会属性和权利属性;数字国内安全与国际安全相互倚重,数字领域出现泛安全化的态势。各国纷纷加强数字安全治理,并在国际层面加强相关合作,从而构建安全有效的数字空间治理体系。 展开更多
关键词 数字安全 网络安全 数据安全 舆论安全 数字企业私权力
在线阅读 下载PDF
移动边缘计算中的多层区块链网络数据防篡改方法研究
19
作者 叶惠仙 《成都工业学院学报》 2025年第3期44-49,共6页
研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区... 研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区块链组合随机数与网络数据,结合哈希算法与不对称的公钥和私钥,对移动边缘计算中的多层区块链网络数据进行加密,并利用解密方式反向验证数据是否被篡改,阻止危险发生,保障数据私钥泄露后的数据防篡改;中间层中间节点定期将边缘区块链获取的安全数据包发布给中间区块链,并在认证层认证节点作用下完成移动边缘计算数据的安全保护。实验结果说明,所提方法可有效保障移动边缘计算中的多层区块链网络数据安全,避免数据被篡改,同时所提方法应用后数据被篡改次数很低,抗攻击性能强,数据存储无丢失,稳定性好。 展开更多
关键词 区块链 移动边缘计算 防篡改方法 哈希算法 网络数据 私钥加密
在线阅读 下载PDF
上一页 1 2 115 下一页 到第
使用帮助 返回顶部