期刊文献+
共找到568篇文章
< 1 2 29 >
每页显示 20 50 100
CONSTRUCTION OF AUTHENTICATION CODES WITH ARBITRATION FROM UNITARY GEOMETRY 被引量:4
1
作者 Li Ruihu\ Guo Luobin 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1999年第4期475-480,共6页
A family of authentication codes with arbitration is constructed from unitary geometry,the parameters and the probabilities of deceptions of the codes are also computed.In a special case a perfect authentication code ... A family of authentication codes with arbitration is constructed from unitary geometry,the parameters and the probabilities of deceptions of the codes are also computed.In a special case a perfect authentication code with arbitration is obtained. 展开更多
关键词 authentication codes ARBITER unitary geom etry
在线阅读 下载PDF
TWO NEW CONSTRUCTIONS OF CARTESIAN AUTHENTICATION CODES FROM SYMPLECTIC GEOMETRY 被引量:4
2
作者 GAO YOU AND ZOU ZENGJIA (Department of Basic Science, Northeast Institute of Electric Power, Jinn 132012). 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1995年第3期345-356,共12页
In this paper, two new constructions of Cartesian authentication codes from symplectic geometry are presented and their size parameters are computed.
关键词 Cartesian authentication code construction symplectic geometry
在线阅读 下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
3
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
在线阅读 下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
4
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 time out-medium access control (T-MAC) security vulnerability authentication SYNCHRONIZATION authenticationmasking code
在线阅读 下载PDF
Using Normal Form of Idempotent Matrices over Finite Local Ring Z/p^kZ to Construct Cartesian Authentication Codes 被引量:1
5
作者 赵辉芳 南基洙 《Northeastern Mathematical Journal》 CSCD 2007年第2期123-131,共9页
In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probab... In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probabilities of successful impersonation and substitution attack under the hypothesis that the cecoding rules are chosen according to a uniform probability distribution. 展开更多
关键词 idempotent matrix finite local ring Cartesian authentication code
在线阅读 下载PDF
A Note on Authentication Codes with Arbitration 被引量:1
6
作者 李育强 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第4期103-106, ,共4页
By use of partially balanced t-designs (v,b, k;λ,0) that is constructed by the rational normal curves given by [5] and the Cartesian product given by [4],an authentication code with arbitration is constructed and its... By use of partially balanced t-designs (v,b, k;λ,0) that is constructed by the rational normal curves given by [5] and the Cartesian product given by [4],an authentication code with arbitration is constructed and its probability of success of attacks by the transmitter, the receiver and the opponent is obtained in this paper. 展开更多
关键词 authentication codes ARBITRATION partially balanced t-designs
在线阅读 下载PDF
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code 被引量:1
7
作者 Xinwei Zhong Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2021年第2期85-95,共11页
With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response... With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective. 展开更多
关键词 QR code visual secret sharing low computational complexity authentication
在线阅读 下载PDF
A Construction of Multi-Sender Authentication Codes from Eigenvalues and Eigenvectors of the Matrix Over Finite Fields
8
作者 Xiuli Wang Lina Wang Yakun Hao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2019年第1期51-60,共10页
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta... We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message. 展开更多
关键词 multi-sender authentication codes NONSINGULAR symmetric matrix EIGENVALUES EIGENVECTORS finite fields
在线阅读 下载PDF
Message Authentication Scheme Based on Quantum Error-correction Codes 被引量:1
9
作者 Ying Guo Guihua Zeng Yun Mao 《通讯和计算机(中英文版)》 2006年第7期36-39,共4页
关键词 美国昆腾公司 技术鉴定 编译程序 技术创新
在线阅读 下载PDF
A Construction Method of Cartesian Authentication Codes from B N Pair Decomposition of SL_n(F_q)
10
作者 陈殿友 付治国 韩燕 《Northeastern Mathematical Journal》 CSCD 2007年第6期523-531,共9页
In the present paper, a construction of Cartesian authentication codes by using the BN pair decomposition of special linear group is presented. Moreover, under the case that the encoding rules are chosen according to ... In the present paper, a construction of Cartesian authentication codes by using the BN pair decomposition of special linear group is presented. Moreover, under the case that the encoding rules are chosen according to a uniform probability distribution, the probability of a successful impersonation attack and the probability of a successful substitution attack of the code are computed. 展开更多
关键词 authentication code special linear group BN pair decomposition
在线阅读 下载PDF
A construction of authentication codes with arbitration based on orthogonal spaces
11
作者 BOUBACAR ABBA 游宏 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第2期134-140,共7页
In this paper we give a new construction of authentication codes with arbitration using orthogonal spaces. Some parameters and the probabilities of successful attacks are computed.
关键词 authentication codes with arbitration orthogonal spaces finite field
在线阅读 下载PDF
TESLA-Based Authentication for BeiDou Civil Navigation Message 被引量:3
12
作者 Zhijun Wu Yun Zhang +1 位作者 Liang Liu Meng Yue 《China Communications》 SCIE CSCD 2020年第11期194-218,共25页
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here... Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system. 展开更多
关键词 BeiDou navigation system SM commercial cryptographic algorithm TESLA message authentication code D2 navigation message
在线阅读 下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
13
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code digital watermarking MLUT(modifled look-up table)
在线阅读 下载PDF
Secure authentication of classical messages with single photons
14
作者 王天银 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3189-3192,共4页
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me... This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. 展开更多
关键词 message authentication codes single photons hash function
原文传递
A Secure Public-key Image Authentication Plan
15
作者 YANGQing CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期289-292,共4页
Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo cod... Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo coded, sealed and then processed. In waveletdomain. To enhance security level, public key cryptosystem is utilized to replace traditionalwatermark key. Simulation results are finally given by experiment. 展开更多
关键词 turbo code: image authentication public key cryptosystcm digital watermark
在线阅读 下载PDF
A novel approach to authenticated group key transfer protocol based on AG codes
16
作者 Yuan Dezhai Peng Xingyi +1 位作者 Liu Ting Cui Zhe 《High Technology Letters》 EI CAS 2019年第2期129-136,共8页
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to... Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security. 展开更多
关键词 group key transfer protocol erasure code AG codes non-repeatability CONFIDENTIALITY authentication
在线阅读 下载PDF
基于量子编码的类GHZ态半量子身份认证方案 被引量:1
17
作者 董颖娣 杨放 +1 位作者 王纯 毛力 《量子光学学报》 北大核心 2025年第1期63-70,共8页
针对网络环境下用户身份认证的安全高效的需求,本文提出基于量子编码类GHZ(Greenberger-Horne-Zeilinger)态的半量子身份认证(Semi-Quantum Identity Authentication,SQIA)方案。方案包括具有无限量子操作能力的可信中心及有限操作能力... 针对网络环境下用户身份认证的安全高效的需求,本文提出基于量子编码类GHZ(Greenberger-Horne-Zeilinger)态的半量子身份认证(Semi-Quantum Identity Authentication,SQIA)方案。方案包括具有无限量子操作能力的可信中心及有限操作能力的经典认证用户,借助类GHZ态的性质,在量子编码的辅助条件下认证用户仅采用半量子操作可实现准入用户的身份认证过程。详细的安全性分析表明,所提出的SQIA方案能够抵御特洛伊木马攻击、假冒攻击及纠缠-测量-转发攻击。 展开更多
关键词 量子身份认证 半量子操作 类GHZ态 量子编码
原文传递
无连接场景下基于国密算法的身份认证方法 被引量:1
18
作者 王宏 赵雨昕 《计算机与现代化》 2025年第1期120-126,共7页
传统身份认证方案中,口令、令牌、生物特征等认证方式大多要求用户必须在与服务器端有电磁连接的情况下进行认证,存在着认证信息被截获和攻击的安全风险。为此,本文设计一种无连接状态下基于国密算法的身份认证方案。方案通过二维码和... 传统身份认证方案中,口令、令牌、生物特征等认证方式大多要求用户必须在与服务器端有电磁连接的情况下进行认证,存在着认证信息被截获和攻击的安全风险。为此,本文设计一种无连接状态下基于国密算法的身份认证方案。方案通过二维码和国密算法的配合,在认证方与用户无连接的状态下,形成一个完整的闭环流程来验证用户身份。相较于传统身份认证方案,本文提出的无连接认证方式能有效避免受到潜在电磁攻击的危险,方案原理简单,具有安全性更高、投资更小的特点,在非接触门禁、信息系统登录验证等场景中具有较大的实用作用。 展开更多
关键词 无连接 身份认证 国密算法 二维码 避免电磁攻击
在线阅读 下载PDF
面向智慧油气勘探开发系统的多维密态数据聚合技术研究与应用
19
作者 张晓均 张豪 +1 位作者 李兴鹏 张经伟 《计算机工程与科学》 北大核心 2025年第4期634-643,共10页
工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该... 工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该方案结合超递增序列,改进了同态加密算法,设计了随机盲化秘密参数,即使解密私钥遭泄露,油气勘探开发系统终端设备传输的重要数据也不会被窃取。可信中心根据勘探开发系统中各通信实体的真实身份产生对应的私钥,彼此可以根据对方的身份灵活地协商可认证的会话密钥,计算基于哈希函数的消息认证码。这样,控制中心可以轻量级地验证数据集成平台服务器发送的聚合密文的完整性,解密各个场区关键数据的聚合值,掌握勘探开发状态参数的平均值,实现对智慧油气勘探开发系统的实时监督与调控。安全性分析和性能评估结果表明,所提方案可以安全高效地部署在智慧油气勘探开发环境。 展开更多
关键词 智慧油气勘探开发系统 同态加密 密态聚合 消息认证码 完整性验证
在线阅读 下载PDF
基于DNA存储的食品防伪溯源:技术、挑战与展望 被引量:1
20
作者 宋亚峰 邢冉冉 +4 位作者 梁晓珂 龚娜 甄子璇 张九凯 陈颖 《食品科学》 北大核心 2025年第4期306-314,共9页
食品防伪和溯源是保障食品安全的重要方式。针对不断升级的假冒伪劣手段,多种鉴别技术逐步发展,这些技术在食品质量与安全领域发挥着至关重要的作用。近年来,依靠DNA分子的自身优势,开发出了更先进、更精确的识别和追踪技术,为建立高效... 食品防伪和溯源是保障食品安全的重要方式。针对不断升级的假冒伪劣手段,多种鉴别技术逐步发展,这些技术在食品质量与安全领域发挥着至关重要的作用。近年来,依靠DNA分子的自身优势,开发出了更先进、更精确的识别和追踪技术,为建立高效防伪与精准溯源的食品安全监管体系提供了新思路。本文概述DNA存储技术和DNA溯源码的发展进程,阐述DNA溯源码在食品防伪溯源方面的应用现状及最新研究进展,探讨跨学科合作在推动DNA溯源技术发展中的必要性,以及在实施过程中可能遇到的可持续性和安全性问题。最后,对DNA溯源技术的未来发展趋势进行展望,并针对当前面临的挑战提出相应的解决方案和改进策略,旨在为食品真实性鉴别和产地追溯提供更为科学、高效的手段。 展开更多
关键词 食品真伪鉴别 食品溯源 DNA存储 DNA溯源码
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部