期刊文献+
共找到258篇文章
< 1 2 13 >
每页显示 20 50 100
Secure optical interconnects using orbital angular momentum beams multiplexing/multicasting 被引量:2
1
作者 Yifan Zhao Jun Liu +8 位作者 Shuhui Li Andong Wang Long Zhu Yan Luo Shi Chen Nan Zhou Shuang Zheng Jing Du Jian Wang 《Advanced Photonics Nexus》 2024年第1期26-35,共10页
Orbital angular momentum(OAM),described by an azimuthal phase term expej lθT,has unbound orthogonal states with different topological charges l.Therefore,with the explosive growth of global communication capacity,esp... Orbital angular momentum(OAM),described by an azimuthal phase term expej lθT,has unbound orthogonal states with different topological charges l.Therefore,with the explosive growth of global communication capacity,especially for short-distance optical interconnects,light-carrying OAM has proved its great potential to improve transmission capacity and spectral efficiency in the space-division multiplexing system due to its orthogonality,security,and compatibility with other techniques.Meanwhile,100-m freespace optical interconnects become an alternative solution for the“last mile”problem and provide interbuilding communication.We experimentally demonstrate a 260-m secure optical interconnect using OAM multiplexing and 16-ary quadrature amplitude modulation(16-QAM)signals.We study the beam wandering,power fluctuation,channel cross talk,bit-error-rate performance,and link security.Additionally,we also investigate the link performance for 1-to-9 multicasting at the range of 260 m.Considering that the power distribution may be affected by atmospheric turbulence,we introduce an offline feedback process to make it flexibly controllable. 展开更多
关键词 orbital angular momentum free-space optical interconnects security space-division multiplexing multicastING
在线阅读 下载PDF
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
2
作者 Md. Shamim Hossain Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2023年第8期134-148,共15页
The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the afore... The performance of Rayleigh fading channels is substantially impacted by the impacts of relays, antennas, and the number of branches. Opportunistic relaying is a potent technique for enhancing the effects of the aforementioned factors while enhancing the performance of fading channels. Due to these issues, a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is taken into consideration in this study. So the investigation of a secure wireless multicasting scenario using opportunistic relaying over Rayleigh fading channel in the presence of multiple wiretappers is the focus of this paper. The primary goals of this study are to maximize security in wireless multicasting while minimizing security loss caused by the effects of relays, branches at destinations and wiretappers, as well as multicast users and wiretappers through opportunistic relaying. To comprehend the insight effects of prior parameters, the closed form analytical expressions are constructed for the probability of non-zero secrecy multicast capacity (PNSMC), ergodic secrecy multicast capacity (ESMC), and secure outage probability for multicasting (SOPM). The findings demonstrate that opportunistic relaying is a successful method for reducing the loss of security in multicasting. 展开更多
关键词 Ergodic Secrecy multicast Capacity Probability of Non-Zero Secrecy multicast Capacity secure Wireless multicasting secure Outage Probability for multicasting
在线阅读 下载PDF
Enhancing Security in Multicellular Multicast Channels Reducing Interference Power with the Best Relay Selection
3
作者 Shaikh Muhammad Rizwan Ali Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第1期1-26,共26页
The capacity of wireless networks is fundamentally limited by interference. A few research has focused on the study of the simultaneous effect of interference and correlation, and less attention has been paid to the t... The capacity of wireless networks is fundamentally limited by interference. A few research has focused on the study of the simultaneous effect of interference and correlation, and less attention has been paid to the topic of canceling simultaneous effect of interference and correlation until recently. This paper considers a secure wireless multicasting scenario through multicellular networks over spatially correlated Nakagami-<i>m</i> fading channel in the presence of multiple eavesdroppers. Authors are interested to protect the desired signals from eavesdropping considering the impact of perfect channel estimation (PCE) with interference and correlation. The protection of eavesdropping is also made strong reducing the simultaneous impact of interference and correlation on the secrecy multicast capacity employing opportunistic relaying technique. In terms of the signal-to-interference plus noise ratio (SINR), fading parameter, correlation coefficient, the number of multicast users and eavesdroppers and the number of antennas at the multicast users and eavesdroppers, the closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting to understand the insight of the effects of aforementioned parameters. The results show that the simultaneous effects of correlation and interference at the multicast users degrade security in multicasting. Moreover, the security in multicasting degrades with the intensity of fading and the number of multicast users, eavesdroppers and antennas at the eavesdroppers. The effects of these parameters on the security in multicasting can be significantly reduced by using opportunistic relaying technique with PCE. Finally, the analytical results are verified via Monte-Carlo simulation to justify the validity of derived closed-form analytical expressions. 展开更多
关键词 Correlation Interference Power Multicellular multicast Channel Nakagami-m Fading Opportunistic Relaying Probability of Non-Zero Secrecy multicast Capacity secure Outage Probability for multicasting
在线阅读 下载PDF
Enhancement of Multicast Security with Opportunistic Relaying Technique over κ-μ Shadowed Fading Channels
4
作者 Ashik Alam Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期121-137,共17页
The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i... The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers. 展开更多
关键词 Opportunistic Relaying Probability of Non-Zero Secrecy multicast Capacity (PNSMC) secure Wireless multicasting secure Outage Probability for multicasting (SOPM) κ-μ Shadowed Fading Channel
在线阅读 下载PDF
Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing
5
作者 Mohammad Mahmud Hasan Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期72-90,共19页
The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by th... The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel. 展开更多
关键词 Orthogonal Space-Frequency Block Coding Orthogonal Frequency Division Multiplexing Probability of Non-Zero Secrecy multicast Capacity secure Outage Probability for multicasting
在线阅读 下载PDF
基于IP Security的安全多播体系结构的研究与分析
6
作者 许强 李信满 赵宏 《计算机科学》 CSCD 北大核心 2000年第6期64-67,54,共5页
1 引言随着分布式多媒体及分布式处理的发展,多播逐渐成为构建面向群组服务平台的一种重要通信模式,并且得到了成功的应用。然而,目前的多播平台对于安全问题考虑得比较少,在一定程度上存在着安全隐患。例如,在Internet及ATM等集成网络... 1 引言随着分布式多媒体及分布式处理的发展,多播逐渐成为构建面向群组服务平台的一种重要通信模式,并且得到了成功的应用。然而,目前的多播平台对于安全问题考虑得比较少,在一定程度上存在着安全隐患。例如,在Internet及ATM等集成网络中,多播流量与其他网络流量共享网络资源。 展开更多
关键词 INTERNET网 多播 体系结构 IPsecurity
在线阅读 下载PDF
Securing Multicast Route Discovery for Mobile Ad Hoc Networks 被引量:3
7
作者 YANG Mingxi LI Layuan FANG Yiwei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期189-192,共4页
This paper presents SMRAN, a novel securing multicast route discovery scheme for mobile ad hoc networks. The scheme relies entirely on hash chains based one-time signature mechanism, HORSEI, with very efficient signin... This paper presents SMRAN, a novel securing multicast route discovery scheme for mobile ad hoc networks. The scheme relies entirely on hash chains based one-time signature mechanism, HORSEI, with very efficient signing and verifying, and we do this by improving the HORSE protocol through the introduction of intermediate hash joints. The main purpose of SMRAN is to provide source authentication for multicast routing discovery messages in mobile ad hoc networks. SMRAN will construct multicast tree with authentication constrains in ad hoc networks. The performance measure of SMRAN is evaluated using simulator NS2. The results represent that SMRAN produces less end-to-end packet latency than public key based secure routing scheme, and it is a feasible approach to securing multicast routing for mobile ad hoc networks. 展开更多
关键词 security multicast ROUTE MOBILE ad hoc
在线阅读 下载PDF
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture 被引量:1
8
作者 Zhizhong Yin Long Zhang +2 位作者 Xianwei Zhou Peng Xu Yu Deng 《International Journal of Communications, Network and System Sciences》 2010年第4期355-363,共9页
Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite netwo... Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite network architecture including Geostationary Earth Orbit (GEO), Highly Elliptical Orbit (HEO), and Low Earth Orbit (LEO) satellite layers, which provides the near-global coverage with 24 hour uninterrupted over the areas varying from 75° S to 90° N. On the basis of the hierarchical architecture, we propose a QoS-guaranteed secure multicast routing protocol (QGSMRP) for satellite IP networks using the logical location concept to isolate the mobility of LEO and HEO satellites. In QGSMRP, we employ the asymmetric cryptography to secure the control messages via the pairwise key pre-distribution, and present a least cost tree (LCT) strategy to construct the multicast tree under the condition that the QoS constraints are guaranteed, aiming to minimize the tree cost. Simulation results show that the performance benefits of the proposed QGSMRP in terms of the end-to-end tree delay, the tree cost, and the failure ratio of multicasting connections by comparison with the conventional shortest path tree (SPT) strategy. 展开更多
关键词 SATELLITE Networks security multicast ROUTING Quality of Service HIERARCHICAL Architecture
在线阅读 下载PDF
Enhancing Security in Correlated Nakagami-m Fading Cellular Network Using SC and SSC Diversity Combining 被引量:1
9
作者 S. M. Rizwan Ali M. Z. I. Sarkar 《Wireless Engineering and Technology》 2022年第1期1-17,共17页
The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quan... The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quantify as the diversity scheme is more efficient in enhancing the security of cellular multicast network mitigating the effects of correlation. Motivated by this issue, this paper considers a secure wireless multicasting scenario through correlated cellular networks in the presence of multiple eavesdroppers. The selection combining (SC) and switch and stay combining (SSC) techniques are considered in dual arbitrarily correlated Nakagami-m fading channels. The closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived to understand the insight into the effects of correlation on the SC and SSC diversity schemes and to quantify which diversity scheme is more efficient in enhancing the security of correlated multicast networks. The results show that, although the diversity gain reduces the effect of correlation, the diversity gain provided by the SC diversity scheme is more significant in mitigating the effect of correlation compared to the SSC diversity scheme. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of the eavesdropper’s channel compared to the case of the SSC diversity scheme. 展开更多
关键词 Arbitrarily Correlated Nakagami-m Fading Cellular multicast Channel Probability of Non-Zero Secrecy multicast Capacity SC and SSC Diversity Schemes secure Outage Probability for multicasting
在线阅读 下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
10
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 multicast security Group communication Group key management Access control Secret key tree
在线阅读 下载PDF
Secure Wireless Multicasting through Nakagami-m Fading Channels with Multi-Hop Relaying
11
作者 Md. Mizanur Rahman Md. Zahurul Islam Sarkar Mohammad Mahmud Hasan 《Journal of Computer and Communications》 2023年第5期177-193,共17页
The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity g... The additional diversity gain provided by the relays improves the secrecy capacity of communications system significantly. The multiple hops in the relaying system is an important technique to improve this diversity gain. The development of an analytical mathematical model of ensuring security in multicasting through fading channels incorporating this benefit of multi-hop relaying is still an open problem. Motivated by this issue, this paper considers a secure wireless multicasting scenario employing multi-hop relaying technique over frequency selective Nakagami-m fading channel and develops an analytical mathematical model to ensure the security against multiple eavesdroppers. This mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to ensure the security in the presence of multiple eavesdroppers. Moreover, the effects of the fading parameter of multicast channel, the number of hops and eavesdropper are investigated. The results show that the security in multicasting through Nakagami-m fading channel with multi-hop relaying system is more sensitive to the number of hops and eavesdroppers. The fading of multicast channel helps to improve the secrecy multicast capacity and is not the enemy of security in multicasting. 展开更多
关键词 Frequency Selective Fading Multi-Hop Relaying Probability of Non-Zero Secrecy multicast Capacity secure Outage Probability for multicasting
在线阅读 下载PDF
A QoS Mobicast-based dynamic clustering secure multicast scheme for large-scale tracking sensornets
12
作者 Jin Jing Qin Zhiguang +1 位作者 Wang Juan Wang Jiahao 《High Technology Letters》 EI CAS 2012年第1期64-71,共8页
Most of the existing security Mobicast routing protocols are not suitable for the monitoring applications with higher quality of service (QoS) requirement. A QoS dynamic clustering secure multicast scheme (QoS-DCSM... Most of the existing security Mobicast routing protocols are not suitable for the monitoring applications with higher quality of service (QoS) requirement. A QoS dynamic clustering secure multicast scheme (QoS-DCSMS) based on Mobicast and multi-level IxTESLA protocol for large-scale tracking sensornets is presented in this paper. The multicast clusters are dynamically formed according to the real-time status of nodes, and the cluster-head node is responsible for status review and certificating management of cluster nodes to ensure the most optimized QoS and security of multicast in this scheme. Another contribution of this paper is the optimal QoS security authentication algorithm, which analyzes the relationship between the QoS and the level Mofmulti-level oTESLA. Based on the analysis and simulation results, it shows that the influence to the network survival cycle ('NSC) and real-time communication caused by energy consumption and latency in authentication is acceptable when the optimal QoS security authentication algorithm is satisfied. 展开更多
关键词 dynamic clustering quality of service (QoS) multi-level ttTESLA secure multicast wirelesssensor networks (WSNs)
在线阅读 下载PDF
A Research on Improvement of Hadoop Security Mechanism
13
《International English Education Research》 2013年第12期90-92,共3页
. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first ... . Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs. 展开更多
关键词 HADOOP security mechanism HDFS MapReduce secure multicast REKEYING
在线阅读 下载PDF
智慧油田中多目标无线安全通信方法研究
14
作者 高国旺 王金凤 高建邦 《黑龙江科学》 2025年第4期80-83,87,共5页
数据是智慧油田的核心,未来智慧油田建设将主要依靠无线通信技术,但无线通信的开放性和广播特性对数据信息的安全传输提出了挑战。在信息传输链路中存在多个合法用户和窃听用户,且在合法用户与窃听用户位置邻近的通信场景中,针对传统物... 数据是智慧油田的核心,未来智慧油田建设将主要依靠无线通信技术,但无线通信的开放性和广播特性对数据信息的安全传输提出了挑战。在信息传输链路中存在多个合法用户和窃听用户,且在合法用户与窃听用户位置邻近的通信场景中,针对传统物理层安全技术无法有效解决多个目标安全通信问题。提出一种基于频控阵的功率可控物理层安全通信方案,设计了随机频控阵列天线,以减小波束距离-角度耦合影响,优化了人工噪声矩阵,确保期望用户不受人工噪声影响,最大化人工噪声对窃听者的干扰,从而提高无线通信的安全性,优化波束成形矩阵,最小化窃听者接收保密信号功率,确保合法用户的最低接收SINR要求。实验结果表明,该方案实现了距离-角度独立的多目标安全通信,能够精确控制合法用户的接收信号功率,从而提高系统的能量效率。 展开更多
关键词 多目标 频控阵 物理层安全 人工噪声
在线阅读 下载PDF
A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS 被引量:1
15
作者 Du Xiaoqiang Bao Wansu Fu Xiangqun 《Journal of Electronics(China)》 2012年第3期294-301,共8页
A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that... A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is and the overall performance is excellent. 展开更多
关键词 security multicast Key management Characteristic values COLLUSION Re-keying
在线阅读 下载PDF
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
16
作者 Ayman El-Sayed 《International Journal of Communications, Network and System Sciences》 2012年第5期286-297,共12页
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t... The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security. 展开更多
关键词 multicast Protocol End-System multicast Application-Level multicast security Group KEY Management
暂未订购
基于分布式智能合约的蜂群自组网安全组播通信及应用 被引量:1
17
作者 张金波 《软件》 2024年第5期117-123,148,共8页
随着无人集群技术的发展及其在竞争性环境中的部署应用,基于对称加密方法的自组织网络通信安全技术已不能满足分布式作战应用对组播通信安全、分布式行为审计和动态成员管理的安全要求。基于此,本文提出利用非对称数字签名进行会员身份... 随着无人集群技术的发展及其在竞争性环境中的部署应用,基于对称加密方法的自组织网络通信安全技术已不能满足分布式作战应用对组播通信安全、分布式行为审计和动态成员管理的安全要求。基于此,本文提出利用非对称数字签名进行会员身份管理,通过分布式块链处理进行组播通信安全审核,基于分布式智能合约实现蜂群自组网安全组播通信架构的无中心、防篡改、可追溯的通信安全策略,同时采用轻量化认证账本进行多任务链的分块存储,以此保障数据区块链的存储效率。本文深入研究了自组网安全组播通信的关键技术,并给出了这些技术的潜在应用方向,可供本领域系统架构设计和技术研究参考。 展开更多
关键词 蜂群自组网 安全组播通信 区块链 智能合约共识 分布式账本
在线阅读 下载PDF
广播电视组播网络分层式安全防护技术研究 被引量:2
18
作者 孔德会 《数字通信世界》 2024年第4期43-45,66,共4页
目前的广播电视组播网络多采用单向的防护形式,安全防护覆盖范围较小,无法达到预期的防护效果。为此文章提出广播电视组播网络分层式安全防护技术。根据当前测定需求,先对组播技术和分层式安全防护技术进行分析,接着探究如何扩大对广播... 目前的广播电视组播网络多采用单向的防护形式,安全防护覆盖范围较小,无法达到预期的防护效果。为此文章提出广播电视组播网络分层式安全防护技术。根据当前测定需求,先对组播技术和分层式安全防护技术进行分析,接着探究如何扩大对广播电视组播网络的安全防护范围——以物理层安全防护为基础,采用数据链路层安全防护和网络层安全防护进行多维防护条件和环境建立,最终通过传输层安全防护与应用层安全防护进一步扩展实际安全防护效果,强化组播网络的防护等级,为广播电视组播任务的执行营造安全环境。 展开更多
关键词 广播电视组播 网络分层 分层式防护 安全防护技术 网络监测 信息识别
在线阅读 下载PDF
A Distributed Multicast Encryption and Management Solutions Based on Security Agent
19
作者 Ping Zhang Liang Zhou 《信息工程期刊(中英文版)》 2014年第5期132-137,共6页
关键词 加密方法 安全代理 分布式 管理 安全组播 多播 通信安全 企业内部网
在线阅读 下载PDF
安全组播综述 被引量:8
20
作者 赵膺 宋佳兴 +1 位作者 徐万鸿 刘卫东 《小型微型计算机系统》 CSCD 北大核心 2003年第10期1873-1877,共5页
组播提供了一种发送者同时发送信息到多个接收者的高效通信机制 ,但是组播的安全问题却阻碍了组播技术的广泛使用 .文章首先讨论了组播所面临的安全风险 ,解释安全风险产生的原因 ,并归纳总结组播的安全问题 ;然后对其中两个需要迫切解... 组播提供了一种发送者同时发送信息到多个接收者的高效通信机制 ,但是组播的安全问题却阻碍了组播技术的广泛使用 .文章首先讨论了组播所面临的安全风险 ,解释安全风险产生的原因 ,并归纳总结组播的安全问题 ;然后对其中两个需要迫切解决的安全问题的解决方案进行深入的论述 。 展开更多
关键词 组播 组播安全 源认证 组密钥管理
在线阅读 下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部