期刊文献+
共找到4,472篇文章
< 1 2 224 >
每页显示 20 50 100
IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption
1
作者 Han-Yu Lin Tung-Tso Tsai Yi-Chuan Wang 《Computers, Materials & Continua》 2026年第3期431-447,共17页
Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud ar... Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption. 展开更多
关键词 Equality test proxy re-encryption IDENTITY-BASED REVOCABLE fog computing
在线阅读 下载PDF
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
2
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
GSMA Open Gateway下跨运营商能力调用的实践探索
3
作者 何宇 孙兴 +3 位作者 陈建伟 吴洪林 郑昊 包雨涵 《通信技术》 2026年第1期78-83,共6页
在5G与数字生态融合背景下,GSMA Open Gateway通过标准化API与统一接入框架,实现应用在全球运营商网络的可移植与规模化部署,降低开发与适配成本,推动运营商能力开放。然而,跨运营商能力调用仍是关键瓶颈。因此,梳理了CAMARA 4类应用程... 在5G与数字生态融合背景下,GSMA Open Gateway通过标准化API与统一接入框架,实现应用在全球运营商网络的可移植与规模化部署,降低开发与适配成本,推动运营商能力开放。然而,跨运营商能力调用仍是关键瓶颈。因此,梳理了CAMARA 4类应用程序编程接口(API)分发模式,对比分析了国内外实践差异。其中,国内运营商针对国内5G网络按需质量保障(QoD)3网互通中聚合平台(Aggregator)面临的痛点,提出了以软件开发工具包(SDK)为核心的解决方案。这一方案通过了统一认证和中国香港商用案例的可行性验证。此外,我国还提出了“SDK+Open Gateway”全球推广与模型上下文协议(MCP)模式演进路径,为全球运营商跨网协同提供中国经验,推动生态从技术框架迈向规模商用,助力数字经济高质量发展。 展开更多
关键词 Open gateway 跨运营商能力调用 模型上下文协议 API标准化
在线阅读 下载PDF
Proxy与Gateway方式连接因特网
4
作者 崔良海 汪琴 《上海第二工业大学学报》 1999年第1期56-61,共6页
本文提出了在基本不增加硬件设备的条件下,使局域网中的每个工作站都能够单独访问Internet,以及收、发电子邮件的解决方案,提出了Proxy与Gateway两种方式,并介绍了这两种方式设置的关键所在。
关键词 INTERNET proxy gateway 电子邮件
在线阅读 下载PDF
Phosphodiesterase 9 localization in cytoplasm and nucleus:the gateway to selective targeting in neuroprotection?
5
作者 Giovanni Ribaudo Matteo Giannangeli +1 位作者 Margrate Anyanwu Alessandra Gianoncelli 《Neural Regeneration Research》 SCIE CAS 2025年第6期1701-1702,共2页
The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect... The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect more than 50million people worldwide.Neurodegenerative disorders are characterized by sundry factors and pathophysiological mechanisms that a re challenging to be fully profiled.Many of these rely on cell signaling pathways to preserve homeostasis,involving second messengers such as cyclic adenosine monophosphate (cAMP)and cyclic guanosine 3',5'-monophosphate(cGMP).Their ability to control the duration and amplitude of the signaling cascade is given by the presence of several common and uncommon effectors.Protein kinases A and G (PKA and PKG),phosphodiesterases (PDEs),and scaffold proteins are among them. 展开更多
关键词 gateway HOMEOSTASIS preserve
暂未订购
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
6
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption WEB3.0
在线阅读 下载PDF
Hengqin:Gateway for Going Global
7
作者 ZHU JIE 《China Today》 2025年第1期50-53,共4页
The synergy and complementary strengths between Macao and Hengqin can create an important channel for Chinese companies to internationalize.CHINESE enterprises have placed much emphasis on going global in recent years... The synergy and complementary strengths between Macao and Hengqin can create an important channel for Chinese companies to internationalize.CHINESE enterprises have placed much emphasis on going global in recent years,from traditional manufacturing giants to emerging tech unicorns,and from traditional sectors to emerging industries like electric vehicles,lithium batteries,and photovoltaic products.The enthusiasm to internationalize reached unprecedented levels in 2024. 展开更多
关键词 COMPANIES gateway LITHIUM
在线阅读 下载PDF
The relationship between proxy decision-making content and cues by families of patients with malignant brain tumor: A descriptive qualitative study
8
作者 Runa Tokunaga Fumiyo Ishikawa 《International Journal of Nursing Sciences》 2025年第2期169-175,共7页
Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues le... Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues leading to those decisions.Methods Semi-structured personal interviews were used to collect data.Seven family members of patients with malignant brain tumors were selected to participate in the study by purposive sampling method from June to August 2022 in the Patient Family Association of Japan.Responses were content analyzed to explore the relationship between the content of decisions regarding“treatment policies”and“daily care”and the cues influencing those decisions.Semi-structured interviews were analyzed by using thematic analysis.Results The contents of proxy decisions regarding“treatment policies”included implementation,interruption,and termination of initial treatments,free medical treatments,use of respirators,and end-of-life sedation and included six cues:treatment policies suggested by the primary physician,information and knowledge about the disease and treatment obtained by the family from limited resources,perceived life threat from symptom worsening,words and reactions from the patient regarding treatment,patient’s personality and way of life inferred from their treatment preferences,family’s thoughts and values hoping for better treatment for the patient.Decisions for“daily care”included meal content and methods,excretion,mobility,maintaining cleanliness,rehabilitation,continuation or resignation from work,treatment settings(outpatient or inpatient),and ways to spend time outside and included seven cues:words and thoughts from the patient about their way of life,patient’s reactions and life history inferred from their preferred way of living,things the patient can do to maintain daily life and roles,awareness of the increasing inability to do things in daily life,family’s underlying thoughts and values about how to spend the remaining time,approval from family members regarding the care setting,advice from medical professionals on living at home.Conclusions For“treatment policies,”guidelines from medical professionals were a key cue,while for“daily care,”the small signs from the patients in their daily lives served as cues for proxy decision-making.This may be due to the lack of information available to families and the limited time available for discussion with the patient.Families of patients with malignant brain tumors repeatedly use multiple cues to make proxy decision-making under high uncertainty.Therefore,nurses supporting proxy decision-making should assess the family’s situation and provide cues that facilitate informed and confident decisions. 展开更多
关键词 Brain neoplasms FAMILY Nurses CUES proxy decision-making
暂未订购
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
9
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
From Silk Road to Global Gateway Rooted in tradition and thriving on creativity, Chengdu is building a global image through culture and connection
10
作者 Tan Ping Hu Haoge 《China Report ASEAN》 2025年第6期74-75,共2页
Chengdu,a city rich in history and culture,is a beacon of China’s storied past embracing a distinct postmodern vibe.As an important hub along the ancient Silk Road,it has long been a meeting point for di!erent civili... Chengdu,a city rich in history and culture,is a beacon of China’s storied past embracing a distinct postmodern vibe.As an important hub along the ancient Silk Road,it has long been a meeting point for di!erent civilizations,where ideas and cultures have exchanged and thrived.Driven by the vision of a community with a shared future for mankind in recent years,Chengdu scholars and media have opened their arms to the world,engaging in multilingual storytelling.These efforts share the warmth and goodwill of a city consistently ranked one of the happiest in China.Through consistent efforts,new insights have emerged—ideas and aspirations intended to be shared with readers both at home and abroad. 展开更多
关键词 history shared future silk road global gateway CREATIVITY CULTURE CONNECTION CIVILIZATIONS
在线阅读 下载PDF
Are Elemental Salinity Proxies Worth Their Salt?
11
作者 Thomas J.Algeo Wei Wei +2 位作者 Zhanhong Liu Yi Song Huyue Song 《Journal of Earth Science》 2025年第4期1848-1852,共5页
Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly cont... Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly controls other watermass properties(e.g.,redox,temperature,p H,and chemical composition)as well as nutrient levels(and thus bioproductivity). 展开更多
关键词 PROXIES SALINITY estuarine systems lagoonal systems temperature non freshwater lacustrine systems redox coastal systems
原文传递
VSSTPM:Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications
12
作者 Ye Bai Debiao He +2 位作者 Zhichao Yang Xiaoying Jia Min Luo 《Digital Communications and Networks》 2025年第6期1783-1796,共14页
The Internet of Things(IoT)has become an integral part of daily life,making the protection of user privacy increasingly important.In gateway-based IoT systems,user data is transmitted through gateways to platforms,pus... The Internet of Things(IoT)has become an integral part of daily life,making the protection of user privacy increasingly important.In gateway-based IoT systems,user data is transmitted through gateways to platforms,pushing the data to various applications,widely used in smart cities,industrial IoT,smart farms,healthcare IoT,and other fields.Threshold Public Key Encryption(TPKE)provides a method to distribute private keys for decryption,enabling joint decryption by multiple parties,thus ensuring data security during gateway transmission,platform storage,and application access.However,existing TPKE schemes face several limitations,including vulnerability to quantum attacks,failure to meet Simulation-Security(SS)requirements,lack of verifiability,and inefficiency,which results in gateway-based IoT systems still being not secure and efficient enough.To address these challenges,we propose a Verifiable Simulation-Secure Threshold PKE scheme based on standard Module-LWE(VSSTPM).Our scheme resists quantum attacks,achieves SS,and incorporates Non-Interactive ZeroKnowledge(NIZK)proofs.Implementation and performance evaluations demonstrate that VSSTPM offers 112-bit quantum security and outperforms existing TPKE schemes in terms of efficiency.Compared to the ECC-based TPKE scheme,our scheme reduces the time cost for decryption participants by 72.66%,and the decryption verification of their scheme is 11 times slower than ours.Compared with the latest lattice-based TPKE scheme,our scheme reduces the time overhead by 90%and 48.9%in system user encryption and decryption verification,respectively,and their scheme is 13 times slower than ours in terms of decryption participants. 展开更多
关键词 IoT gateway TPKE Simulation-security Verifiable Standard module-LWE problem NIZK proof 112-Bit quantum security
在线阅读 下载PDF
Research on the Synergistic Application of Secure Isolation Gateways and Zero Trust Architecture in the Oil and Gas IoT
13
作者 Wang Bo Wang Wei +1 位作者 Zhang Fan Li Zhaoyun 《China Oil & Gas》 2025年第3期61-66,共6页
As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial c... As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements. 展开更多
关键词 industrial control system internet things oil gas IoT control systems secure isolation gateways zero trust architecture information security challengesthe gas extraction plant
在线阅读 下载PDF
Gateway to Growth Malaysia has become a hub for ASEAN-China collaboration thanks to strategic location,infrastructure,and investment potential
14
作者 Dato’Norman Muhamad 《China Report ASEAN》 2025年第12期23-23,共1页
This article is adapted from a speech delivered by Dato’Norman Muhamad,Ambassador of Malaysia to China,at the ASEAN-China(Beijing Municipal Administrative Center)Trade and Investment Promotion Conference.The text has... This article is adapted from a speech delivered by Dato’Norman Muhamad,Ambassador of Malaysia to China,at the ASEAN-China(Beijing Municipal Administrative Center)Trade and Investment Promotion Conference.The text has been edited for clarity and length. 展开更多
关键词 INFRASTRUCTURE investment potential strategic location ASEAN China collaboration trade investment promotion conference Dato Norman Muhamad gateway growth Malaysia ambassador Malaysia China
在线阅读 下载PDF
基于多链协同的医疗集采数据监管方案
15
作者 赵楷 闫俊桥 +2 位作者 胡煜环 毕雪华 张琳琳 《计算机工程》 北大核心 2026年第4期409-423,共15页
随着区块链在医疗领域的广泛应用,对于多样、敏感且规模持续增长的医疗集采数据进行有效监管逐渐显露出其重要性。然而,现有的医疗集采数据监管方案由于业务关联复杂,导致多部门协同监管过程效能低,存在共享监管数据隐私泄露风险。因此... 随着区块链在医疗领域的广泛应用,对于多样、敏感且规模持续增长的医疗集采数据进行有效监管逐渐显露出其重要性。然而,现有的医疗集采数据监管方案由于业务关联复杂,导致多部门协同监管过程效能低,存在共享监管数据隐私泄露风险。因此,基于多链提出了一种支持安全共享的医疗集采数据监管方案。构建一个基于监管中继链的多链协同监管框架,针对医疗集采业务概括出监管元素和受监管数据对象,形成多链协同监管与跨链交互的全面视图;通过多链协同监管模型展示多种监管信息流,将监管元素描述为结构化的跨部门综合监管事项清单,以支持多部门多环节跨链监管;在多链监管实施过程中,将医疗集采业务产生的大量受监管数据对称加密后存储于星际文件系统(IPFS)中,降低区块链存储负担;引入代理重加密(PRE)技术保障对称密钥与元数据的多链间安全共享,并结合可搜索加密算法支撑链上IPFS文件地址密文的检索。以医疗集采业务分析为基础,对监管数据的流转过程进行安全性分析,对协同监管过程中授权、上传和查询等链码进行性能测试。实验结果表明,该方案具备安全性与高效性,相对于其他类似方案更适合医疗领域,能够满足多部门多环节协同监管和数据安全共享需求。 展开更多
关键词 区块链 监管机制 多链 代理重加密 医疗数据
在线阅读 下载PDF
大连石河流域中晚更新世坡洪积物形成与沉积环境分析
16
作者 张威 邵冰倩 +3 位作者 施西悦 王天依 刘甲伟 刘剑刚 《第四纪研究》 北大核心 2026年第1期92-105,共14页
坡洪积物作为坡积与洪积作用下的沉积类型,蕴含着丰富的环境变化信息;研究其地貌形成与沉积环境,有助于理解区域环境变化特点,为地质灾害防治及生态建设提供依据。本研究以大连石河坡洪积沉积剖面为分析对象,剖面出露厚度5.3 m,海拔68 m... 坡洪积物作为坡积与洪积作用下的沉积类型,蕴含着丰富的环境变化信息;研究其地貌形成与沉积环境,有助于理解区域环境变化特点,为地质灾害防治及生态建设提供依据。本研究以大连石河坡洪积沉积剖面为分析对象,剖面出露厚度5.3 m,海拔68 m,整体为红褐色-黄褐色,通过分析其宏观与微观沉积相特征,结合光释光测年、粒度、磁化率、地球化学元素分析,探讨其形成时代与沉积环境,主要结论如下:1)在地形与气候的共同作用下,研究区形成了多期次细粒层与砾石层交互的坡洪积地貌,沉积体细粒组分粉砂含量最高,分选极差,砾石以粗砾、中砾为主,呈棱角及次棱角状,具有典型的近源快速堆积特征;2)光释光年代结果显示,剖面形成于中、晚更新世,分别为130.6±6.6~186.6±9.0 ka、18.8±1.7 ka;3)沉积物环境磁学、化学风化指数(CIA)、风化淋溶系数(Ba)等指标表明,中更新世晚期,质量磁化率均值较高,为135.63×10^(-8)m^(3)/kg,CIA均值为83.5,Ba均值较低(0.25),反映中更新世晚期总体上气候暖湿,水动力条件充足。晚更新世末期,磁化率(128.47×10^(-8)m^(3)/kg)、CIA值均有所降低(75.5),但Ba值明显升高(0.41),反映该时期气候变冷,水动力条件相对减弱。本研究揭示的中、晚更新世环境变化特征与辽东半岛及邻区其他第四纪沉积载体记录具有空间一致性。 展开更多
关键词 坡洪积 光释光 环境代用指标 地貌形成 沉积环境
原文传递
受贿罪新型隐性化背景下既遂与未遂的区分
17
作者 何荣功 刘寅超 《南大法学》 2026年第1期38-56,共19页
贿赂犯罪的新型隐性化为受贿罪的认定和惩治带来了困难。对于受贿罪的既遂标准,刑法理论与实务坚持的“实际控制财物说”没有必要改变,但应充分考虑行贿受贿对立统一的结构关系、从严惩治受贿罪的刑事政策以及当下贿赂犯罪新型隐性化特... 贿赂犯罪的新型隐性化为受贿罪的认定和惩治带来了困难。对于受贿罪的既遂标准,刑法理论与实务坚持的“实际控制财物说”没有必要改变,但应充分考虑行贿受贿对立统一的结构关系、从严惩治受贿罪的刑事政策以及当下贿赂犯罪新型隐性化特点,重视对“实际控制”的实质理解。代持型受贿罪的既未遂认定要重视代持人与行贿受贿双方的人身、财产以及其他利益关系。银行卡受贿罪的既未遂认定应注意结合银行卡给付、银行卡代持、银行卡共有、银行卡失效等具体类型判断行为人是否实际控制财物。受贿罪的既未遂要严格依法认定,避免简单地以认定既遂更有利于从严惩治受贿犯罪为由导致既遂时点的不当提前。 展开更多
关键词 受贿罪 犯罪既遂 实际控制 代持型受贿 银行卡受贿
在线阅读 下载PDF
面向终端用户的轻量级加密文件安全共享方案
18
作者 姜林美 朱文龙 《华侨大学学报(自然科学版)》 2026年第2期146-152,共7页
针对传统文件共享方案因流程繁冗导致效率低下的问题,设计并实现了一种基于区块链的轻量级加密文件安全共享方案。该方案采用代理重加密技术,以区块链节点替代传统代理服务器执行重加密操作;通过星际文件系统(IPFS)底层点对点(P2P)网络... 针对传统文件共享方案因流程繁冗导致效率低下的问题,设计并实现了一种基于区块链的轻量级加密文件安全共享方案。该方案采用代理重加密技术,以区块链节点替代传统代理服务器执行重加密操作;通过星际文件系统(IPFS)底层点对点(P2P)网络,实现了数据所有者与使用者之间的直接通信,显著降低了系统通信开销。实验结果表明:文中方案在保证用户数据安全性的前提下,兼具操作简洁性和终端友好性,有效提升了文件共享效率。 展开更多
关键词 数据共享 代理重加密 星际文件系统(IPFS) 区块链 终端用户
在线阅读 下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
19
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 proxy INTERNE
在线阅读 下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
20
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 proxy JAVA
在线阅读 下载PDF
上一页 1 2 224 下一页 到第
使用帮助 返回顶部