期刊文献+
共找到2,440篇文章
< 1 2 122 >
每页显示 20 50 100
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
1
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB key Impact/response authentication Static password authentication
在线阅读 下载PDF
KEY TECHNOLOGY OF SEMI-CONTINOUS CONVEYOR SYSTEM IN DEEP SURFACE MINE
2
作者 苏靖 刘胜富 任天贵 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 1996年第2期102+99-102,共5页
The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of co... The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of conveyor system are studied, and their calculating models are built up. 展开更多
关键词 surface mine semi-continous conveyor system key technology
在线阅读 下载PDF
Key Environmental Factors Monitoring System of Low-power Greenhouse Based on WSN Technology
3
作者 柳军 陶建平 吕晓兰 《Agricultural Science & Technology》 CAS 2016年第2期449-452,共4页
A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs ... A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value. 展开更多
关键词 Environmental monitoring GREENHOUSE Wireless sensor network WSN technology key factor
在线阅读 下载PDF
Human Digital Twin(HDT)Driven Human-Cyber-Physical Systems:Key Technologies and Applications 被引量:12
4
作者 Baicun Wang Huiying Zhou +2 位作者 Geng Yang Xingyu Li Huayong Yang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2022年第1期1-6,共6页
1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitaliz... 1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitalization revolution,is increasingly adopted in HPS and continuously evolving with the development of advanced manufacturing technologies,leading to the human-cyber-physical system(HCPS)[2]. 展开更多
关键词 system mostly key
在线阅读 下载PDF
Secret Key Generation Based on Two-Way Randomness for TDD-SISO System 被引量:11
5
作者 Shengjun Zhang Liang Jin +1 位作者 Yangming Lou Zhou Zhong 《China Communications》 SCIE CSCD 2018年第7期202-216,共15页
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi... A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test. 展开更多
关键词 secret key generation physical layer security information reconciliation information theory
在线阅读 下载PDF
Measuring-Basis Encrypted Quantum Key Distribution with Four-State Systems 被引量:3
6
作者 CHEN Pan LI Yan-Song +1 位作者 DENG Fu-Guo LONG Gui-Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第1期49-52,共4页
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i... A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used. 展开更多
关键词 quantum key distribution measuring-basis encryption four-state system
在线阅读 下载PDF
Key technologies for medium and low voltage DC distribution system 被引量:6
7
作者 Yiwen Fan Yongning Chi +4 位作者 Yan Li Zhibing Wang Hongzhi Liu Wei Liu Xiangyu Li 《Global Energy Interconnection》 CAS CSCD 2021年第1期91-103,共13页
Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operati... Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system. 展开更多
关键词 Medium and low voltage DC distribution system system topology key equipment DC fault protection Operation control technology
在线阅读 下载PDF
Analysis of key technologies and development of integrated digital processing system for cast blasting design 被引量:3
8
作者 丁小华 李克民 +1 位作者 肖双双 狐为民 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第3期1037-1044,共8页
Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasti... Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasting and casting blast parameters determination which have influence on the effect of casting blast have been researched with the combination of the ballistic theory and experience in mines. The integrated digital processing system of casting blast was developed in order to simplify the design process of casting blast, improve working efficiency and veracity of design result and comprehensively adopt the software programming method and the theory of casting blast. This system has achieved five functions, namely, the 3D visualization graphics management, the intelligent management of geological information, the intelligent design of casting blast, the analysis and prediction of the blasting effect and the automatic output of the design results. Long-term application in opencast coal mines has shown that research results can not only reduce the specific explosive consumption and improve the blasting effect, but also have high value of popularization and application. 展开更多
关键词 opencast coal mine cast blasting key technology digital processing system
在线阅读 下载PDF
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:4
9
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo Haitham Cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
10
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
An autobias control system for the electro optic modulator used in a quantum key distribution system 被引量:1
11
作者 陈文芬 魏正军 +6 位作者 郭莉 侯丽燕 王赓 王金东 张智明 郭建平 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期261-268,共8页
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ... In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM. 展开更多
关键词 quantum key distribution electro-optic modulator autobias control lock-in-amplifier
原文传递
Practical Reference-Frame-Independent Measurement-Device-Independent Quantum Key Distribution Systems Against the Worst Relative Rotation of Reference Frames 被引量:1
12
作者 Chun-Mei Zhang Jian-Rong Zhu Qin Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第10期379-383,共5页
Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys.... Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames. 展开更多
关键词 reference-frame-independent measurement-device-independent quantum key distribution relative rotation
原文传递
Countermeasure against probabilistic blinding attack in practical quantum key distribution systems 被引量:1
13
作者 钱泳君 李宏伟 +5 位作者 何德勇 银振强 张春梅 陈巍 王双 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期111-115,共5页
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by... In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. 展开更多
关键词 countermeasure bound single-photon detector probabilistic blinding attack quantum key distribution
原文传递
A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain 被引量:1
14
作者 Gyeong-Jin Ra Chang-Hyun Roh Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2020年第10期153-170,共18页
In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored da... In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored data,she/he must employ a private key to prove ownership of the data and create a transaction.If the private key is lost,blockchain data cannot be accessed.To solve such a problem,public blockchain users can recover the key using a wallet program.However,key recovery in a permissioned blockchain(PBC)has been but little studied.The PBC server is Honest-but-Curious(HBC),and should not be able to learn anything of the user;the server should simply recover and store the key.The server must also be resistant to malicious attacks.Therefore,key recovery in a PBC must satisfy various security requirements.Here,we present a password-protected secret sharing(PPSS)key recovery system,protected by a secure password from a malicious key storage server of a PBC.We describe existing key recovery schemes and our PPSS scheme. 展开更多
关键词 Password-protected secret sharing key recovery blockchain wallet security
在线阅读 下载PDF
The integrated monitoring system for running parameters of key mining equipment based on condition monitoring technology 被引量:1
15
作者 BIN Guang-fu LI Xue-jun +2 位作者 BALBIR S Dhillon HUANG Zhen-yu GUO Deng-ta 《Journal of Coal Science & Engineering(China)》 2010年第1期108-112,共5页
An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client co... An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment. 展开更多
关键词 mining key equipment running parameters condition monitoring signal acquisition and processing integrated monitoring
在线阅读 下载PDF
Ultra-Wideband RoF System and Its Key Technologies 被引量:1
16
作者 Xu Kun,Yin Jie,Li Jianqiang(Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China) 《ZTE Communications》 2009年第3期16-20,共5页
The microwave photonic technology-based Ultra-Wideband (UWB) Radio over Fiber (RoF) system is an important solution to the future low-cost and high-performance ultra-wideband wireless access network.Much research work... The microwave photonic technology-based Ultra-Wideband (UWB) Radio over Fiber (RoF) system is an important solution to the future low-cost and high-performance ultra-wideband wireless access network.Much research work has been done in this field with abundant results.This article introduces the RoF system that is based on the all-optical vector modulation technology to further enhance signal’s spectrum efficiency;the full-duplex RoF system that is based on the millimeter wave Phase-Shift Keying (PSK) modulation to greatly simplify base station structure and fiber layout;and the RoF system that is based on multi-service mixed transmission to carry the service with both wired signal and several wireless signals.The article also presents an RoF-based high-definition video transmission platform. 展开更多
关键词 ROF over RADIO UWB Ultra-Wideband RoF system and Its key Technologies DAPSK
在线阅读 下载PDF
Key indexes identifying approach of weapon equipment system-of-systems effectiveness integrating Bayes method and dynamic grey incidence analysis model 被引量:2
17
作者 ZHANG Jingru FANG Zhigeng +1 位作者 YE Feng CHEN Ding 《Journal of Systems Engineering and Electronics》 CSCD 2024年第6期1482-1490,共9页
Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification an... Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed.The method uses multi-layer Bayesian techniques,makes full use of historical statistics and empirical information,and determines the Bayesian estima-tion of the incidence degree of indexes,which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes.Sec-ondly,The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence,and then identifies key system effec-tiveness evaluation indexes.Finally,the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system,and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes,and has good data extraction capability in the case of small samples. 展开更多
关键词 weapon equipment system-of-systems(WESoS) effectiveness index system effectiveness key index Bayes theo-rem grey incidence analysis (extremely)small samples
在线阅读 下载PDF
Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings 被引量:1
18
作者 Mariana Durcheva 《Journal of Mathematics and System Science》 2014年第1期6-13,共8页
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob... The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography. 展开更多
关键词 Public key cryptosystem exotic semirings semiring action residuals.
在线阅读 下载PDF
Secure SSL/TLS Communication System Based on Quantum Keys 被引量:1
19
作者 WANG Jigang LU Yuqian +2 位作者 WEI Liping JIANG Xinzao ZHANG Han 《ZTE Communications》 2024年第3期106-115,共10页
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ... Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks. 展开更多
关键词 SSL/TLS protocols quantum key post-quantum cryptography
在线阅读 下载PDF
融合代理重加密和零知识证明的USBKey联盟链追溯系统 被引量:2
20
作者 张磊 万昕元 +3 位作者 肖超恩 王建新 邓昊东 郑玉崝 《信息安全研究》 北大核心 2025年第1期81-90,共10页
目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Ke... 目前,基于区块链技术的信息追溯系统在物联网领域中得到了广泛应用.但是,基于区块链的追溯系统在追溯数据存储和查询的过程中存在数据及用户隐私泄露的风险.针对此类问题,融合代理重加密和零知识证明技术,设计了基于联盟链构造的USB Key可信追溯解决方案.首先,在区块链上链存储过程中引入了星际文件系统(interplanetary file system,IPFS)和代理重加密技术,为参与双方建立了一个安全、高效的信息存储机制;同时,在数据查询过程中引入了zk-SNARK零知识证明机制,对查询用户进行身份认证和确权操作,确保了追溯数据查询过程中用户身份的私密性;最后,基于上述可信追溯解决方案,利用Hyperledger Fabric分布式账本实现了一个USB Key的信息追溯原型系统.通过实验,证明了该方案切实可行,并有效地保障了USB Key追溯系统中追溯信息的保密性和真实性,以及在实现权限分配的前提下用户身份的隐私性. 展开更多
关键词 USB key 代理重加密 零知识证明 区块链 信息追溯
在线阅读 下载PDF
上一页 1 2 122 下一页 到第
使用帮助 返回顶部