期刊文献+
共找到228篇文章
< 1 2 12 >
每页显示 20 50 100
Improved Resilience of Image Encryption Based on Hybrid TEA and RSA Techniques
1
作者 Muath AlShaikh Ahmed Manea Alkhalifah Sultan Alamri 《Computer Systems Science & Engineering》 2025年第1期353-376,共24页
Data security is crucial for improving the confidentiality,integrity,and authenticity of the image content.Maintaining these security factors poses significant challenges,particularly in healthcare,business,and social... Data security is crucial for improving the confidentiality,integrity,and authenticity of the image content.Maintaining these security factors poses significant challenges,particularly in healthcare,business,and social media sectors,where information security and personal privacy are paramount.The cryptography concept introduces a solution to these challenges.This paper proposes an innovative hybrid image encryption algorithm capable of encrypting several types of images.The technique merges the Tiny Encryption Algorithm(TEA)and Rivest-Shamir-Adleman(RSA)algorithms called(TEA-RSA).The performance of this algorithm is promising in terms of cost and complexity,an encryption time which is below 10ms was recorded.It is implied by correlation coefficient analysis that after encryption there is a notable decrease in pixel correlation,therefore making it effective at disguising pixel relationships via obfuscation.Moreover,our technique achieved the highest Normalized Pixel Cross-Correlation(NPCC),Number of Pixel Change Rate(NPCR)value over 99%consistent,and a Unified Average Changing Intensity(UACI)value which stands at around 33.86 thereby making it insensitive to statistical attacks hence leading to massive alteration of pixel values and intensities.These make clear the resistance of this process to any sort of hacking attempt whatsoever that might want unauthorized access into its domain.It is important to note that the integrity of images is well preserved throughout encryption as well as decryption stages in line with these low decryption times are clear indications.These results collectively indicate that the algorithm is effective in ensuring secure and efficient image encryption while maintaining the overall integrity and quality of the encrypted images.The proposed hybrid approach has been investigated against cryptoanalysis such as Cyphertext-only attacks,Known-plaintext attacks,Chosen-plaintext attacks,and Chosen-ciphertext attacks.Moreover,the proposed approach explains a good achievement against cropping and differential attacks. 展开更多
关键词 Image encryption hybrid encryption SYMMETRIC ASYMMETRIC RSA TEA CRYPTANALYSIS
在线阅读 下载PDF
Hybrid image encryption scheme based on hyperchaotic map with spherical attractors
2
作者 Zhitang Han Yinghong Cao +1 位作者 Santo Banerjee Jun Mou 《Chinese Physics B》 2025年第3期314-322,共9页
Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spher... Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spherical attractor is proposed,which is constructed using spherical coordinates.Dynamical analyses reveal that the hyperchaotic map exhibits global hyperchaos and high complexity,making it capable of generating more complex chaotic sequences suitable for image encryption.A hybrid encryption scheme based on a hyperchaotic map is proposed for two-dimensional(2D)images,three-dimensional(3D)models,and 3D point clouds.Firstly,the pixels of 2D image and the coordinate data of 3D image are fused into a plaintext cube,which is combined with Hash-512 to obtain the initial value of the hyperchaotic map.Chaotic sequences are utilized for cube space internal confusion and dynamic cross-diffusion.The encrypted images demonstrate high information entropy,and the test results show that the encryption scheme effectively protects the images.The proposed hybrid image encryption scheme provides an efficient solution for securing various types of images. 展开更多
关键词 hyperchaotic map spherical attractor global hyperchaos hybrid image encryption
原文传递
Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information
3
作者 Ce Li Xinyu Shang +3 位作者 Liguo Zhang Feng Yang Jing Zheng Xianlei Xu 《Computers, Materials & Continua》 SCIE EI 2019年第9期1245-1260,共16页
Pipeline defect detection systems collect the videos from cameras of pipeline robots,however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats.Th... Pipeline defect detection systems collect the videos from cameras of pipeline robots,however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats.The existing systems tend to reach the limit in terms of data access anywhere,access security and video processing on cloud.There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection.In this paper,we deploy the framework of a cloud based pipeline defect detection system,including the user management module,pipeline robot control module,system service module,and defect detection module.In the system,we use a role encryption scheme for video collection,data uploading,and access security,and propose a hybrid information method for defect detection.The experimental results show that our approach is a scalable and efficient defection detection cloud system. 展开更多
关键词 Defect detection cloud computing data encryption hybrid information
在线阅读 下载PDF
A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
4
作者 Nwe Ni Khin Thanda Win 《Journal of Computer and Communications》 2022年第9期22-36,共15页
Nowadays, increased information capacity and transmission processes make information security a difficult problem. As a result, most researchers employ encryption and decryption algorithms to enhance information secur... Nowadays, increased information capacity and transmission processes make information security a difficult problem. As a result, most researchers employ encryption and decryption algorithms to enhance information security domains. As it progresses, new encryption methods are being used for information security. In this paper, a hybrid encryption algorithm that combines the honey encryption algorithm and an advanced DNA encoding scheme in key generation is presented. Deoxyribonucleic Acid (DNA) achieves maximal protection and powerful security with high capacity and low modification rate, it is currently being investigated as a potential carrier for information security. Honey Encryption (HE) is an important encryption method for security systems and can strongly prevent brute force attacks. However, the traditional honeyword encryption has a message space limitation problem in the message distribution process. Therefore, we use an improved honey encryption algorithm in our proposed system. By combining the benefits of the DNA-based encoding algorithm with the improved Honey encryption algorithm, a new hybrid method is created in the proposed system. In this paper, five different lookup tables are created in the DNA encoding scheme in key generation. The improved Honey encryption algorithm based on the DNA encoding scheme in key generation is discussed in detail. The passwords are generated as the keys by using the DNA methods based on five different lookup tables, and the disease names are the input messages that are encoded by using the honey encryption process. This hybrid method can reduce the storage overhead problem in the DNA method by applying the five different lookup tables and can reduce time complexity in the existing honey encryption process. 展开更多
关键词 Honey encryption DNA Encoding hybrid Method Data Lookup Tables Time Complexity Storage Overhead
在线阅读 下载PDF
Aminoclay decorated with lanthanide complexes and carbon dots:Tunable emission and information encryption 被引量:4
5
作者 Tianren Wang Jing Yang +1 位作者 Huanrong Li Yige Wang 《Journal of Rare Earths》 SCIE EI CAS CSCD 2019年第9期995-1001,I0004,共8页
Herein we present emission color-tunable and multi-functional lanthanide(Ⅲ)luminescent hybrid materials(Ln(DPA)@AC-CDs)by mixing aminoclay(AC),2,6-pyridinedicarboxylic acid(DPA),Ln3+(Ln=Eu,Tb or Eu and Tb in differen... Herein we present emission color-tunable and multi-functional lanthanide(Ⅲ)luminescent hybrid materials(Ln(DPA)@AC-CDs)by mixing aminoclay(AC),2,6-pyridinedicarboxylic acid(DPA),Ln3+(Ln=Eu,Tb or Eu and Tb in different molar ratios),and carbon dots(N,S-CDs)in water,showing high quantum yields up to 58.8%.The emission colors can be finely tuned by altering the excitation wavelength and the amounts of the components,and white light emission(CIE-(0.27,0.25))can be achieved for sample Eu1Tb2(DPA)@AC-CDs under 325 nm light irradiation.In addition,under 365 nm UV light excitation,the Eu(DPA)@AC-CDs powder exhibits red luminescence due to the sensitization effect of N,S-CDs on Eu^3+,which turns to bright blue when the powder is dispersed in water attributed to the high dispersion of the aggregated N,S-CDs particles.These luminescent properties afford Ln(DPA)@AC-CDs potential candidates for designing optoelectronic devices like WLEDs or in information encryption applications. 展开更多
关键词 LANTHANIDE Carbon DOTS hybrid material WHITE light Information encryption RARE earths
原文传递
基于DES-RSA混合加密的无线网络数据安全传输方法
6
作者 谭再峰 高祖彦 《自动化与仪器仪表》 2025年第12期42-46,共5页
针对传统无线网络数据传输过程中数据加密效率与数据加密效果兼顾性能较弱的问题;提出一种基于DES-RSA混合加密的无线网络数据安全传输方法;本方法通过对传统的DES算法进行针对性改进,增加密钥长度和随机性,提高数据加密的抗攻击能力,... 针对传统无线网络数据传输过程中数据加密效率与数据加密效果兼顾性能较弱的问题;提出一种基于DES-RSA混合加密的无线网络数据安全传输方法;本方法通过对传统的DES算法进行针对性改进,增加密钥长度和随机性,提高数据加密的抗攻击能力,同时结合RSA算法对DES密钥进行加密以构建双重加密机制;设计了以NIST标准数据集以及某智能通信网络2024年6月至2024年12月的运行数据集随机混合数据集为基础的实验进行性能验证;实验结果表明,本方法在不同规模数据情况下加密解密时间与加密解密效果方面更加均衡高效,在全规模范围内本方法的安全系数可达97.77%,标准差为1.11%,表明本方法在无线网络数据安全传输中的稳定性及普适性。 展开更多
关键词 无线网络 数据安全 des-rsa混合加密 传输效率 网络安全
原文传递
SM algorithms-based encryption scheme for large genomic data files 被引量:2
7
作者 Yatong Jiang Tao Shang Jianwei Liu 《Digital Communications and Networks》 SCIE CSCD 2021年第4期543-550,共8页
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually... With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually reduced.The analysis and utilization of genomic dam gradually entered the public view,and the leakage of genomic dam privacy has attracted the attention of researchers.The security of genomic data is not only related to the protection of personal privacy,but also related to the biological information security of the country.However,there is still no.effective genomic dam privacy protection scheme using Shangyong Mima(SM)algorithms.In this paper,we analyze the widely used genomic dam file formats and design a large genomic dam files encryption scheme based on the SM algorithms.Firstly,we design a key agreement protocol based on the SM2 asymmetric cryptography and use the SM3 hash function to guarantee the correctness of the key.Secondly,we used the SM4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files,and improve the usability by assisting the computing platform with key management.Software implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on SM algorithms for protecting the privacy of genomic data. 展开更多
关键词 Genomic data Privacy protection SM algorithm Key agreement protocol hybrid encryption
在线阅读 下载PDF
A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images 被引量:1
8
作者 Ahmed S.Salama Mohamed Amr Mokhtar +2 位作者 Mazhar B.Tayel Esraa Eldesouky Ahmed Ali 《Computers, Materials & Continua》 SCIE EI 2021年第7期431-446,共16页
Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Tr... Assuring medical images protection and robustness is a compulsory necessity nowadays.In this paper,a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform(DWT)with the energy compaction of the Discrete Wavelet Transform(DCT).The multi-level Encryption-based Hybrid Fusion Technique(EbhFT)aims to achieve great advances in terms of imperceptibility and security of medical images.A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform.Afterwards,a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark.Lastly,a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT.Thus,the watermarked image is generated by enclosing both keys into DWT and DCT coefficients.The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods.In order to validate the proposed technique,a standard dataset of medical images is used.Simulation results show higher performance of the visual quality(i.e.,57.65)for the watermarked forms of all types of medical images.In addition,EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation(NC).Finally,extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique. 展开更多
关键词 Medical image processing digital image watermarking discrete wavelet transforms discrete cosine transform encryption image fusion hybrid fusion technique
在线阅读 下载PDF
Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm 被引量:1
9
作者 Emmanuel Nwabueze Ekwonwune Victor Chibunna Enyinnaya 《Journal of Software Engineering and Applications》 2020年第3期25-40,共16页
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M... The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java. 展开更多
关键词 encryption hybrid Security Integrity Authentication Vulnerability Cryptography Short MESSAGE Service (SMS) Global System for Mobile Communication (GSM) MESSAGE Digest 5 (MD5) BLOWFISH and Rivest-Shamir Adleman (RSA)
在线阅读 下载PDF
A Note on a Provable Secure Encryption Scheme
10
作者 王明强 秦静 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期655-658,共4页
A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our s... A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our scheme can be instantiated with any computational secure key derivation and message authentication functions. Thus it extends the applicability of the Kurosawa-Desmedt scheme and improves its efficiency. 展开更多
关键词 hybrid encryption scheme chosen-ciphertext attack authentication function
原文传递
典型密码算法的优化研究
11
作者 许佳杰 倪文清 +2 位作者 蔡应强 雷国伟 廖文良 《佳木斯大学学报(自然科学版)》 2026年第3期34-37,42,共5页
面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基... 面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基于AES算法的预计算查表技术(T表),将轮函数运算转化为内存访问操作,实现加解密吞吐量倍增;二是构建AES-NTRU混合加密架构,通过量子安全密钥封装机制(KEM)实现传输效率与抗攻击能力的双重提升。实验表明,传统算法与后量子密码的协同部署能有效应对新型威胁,可以为密码体系平滑过渡至量子计算时代提供技术储备。 展开更多
关键词 对称密码 非对称密码 混合加密系统 后量子密码
在线阅读 下载PDF
基于UWB+LoRa的井下精确定位系统终端固件升级方法
12
作者 胡宇 《煤矿安全》 北大核心 2026年第1期237-246,共10页
针对煤矿井下定位系统在固件无线升级环节面临升级效率与服务可靠性的双重瓶颈,提出了一种基于超宽带(UWB)与远距离低功耗无线通信技术(LoRa)协同传输的终端固件双模冗余升级架构。该架构将UWB的厘米级高精度定位能力与LoRa的广域通信... 针对煤矿井下定位系统在固件无线升级环节面临升级效率与服务可靠性的双重瓶颈,提出了一种基于超宽带(UWB)与远距离低功耗无线通信技术(LoRa)协同传输的终端固件双模冗余升级架构。该架构将UWB的厘米级高精度定位能力与LoRa的广域通信覆盖特性有机融合,构建了具备空间自适应特性的异构网络体系。在通信策略方面,设计了动态双模协同机制:在终端稀疏区,系统采用UWB技术对定位信号与固件升级信道进行时分复用,既满足了精确定位需求,又实现了点对点固件传输;在终端密集区,启用双模分工机制,由UWB持续提供实时定位服务的同时,借助LoRa独立信道进行并行广播式固件分发,从而显著提升了多终端升级效率。为保证系统在复杂井下环境中的安全运行,引入了三重防护体系:①结合非对称加密(RSA)与对称加密(AES)构建了分级密钥管理体系,实现了固件传输环节的全链路加密防护,有效防范数据泄露和篡改;②基于空间分布特征设计了自适应固件获取机制,在终端稀疏区支持终端主动发起固件请求,在终端密集区则由基站主动广播升级包,并以此机制为基础实现了固件断点续传功能,提高了传输的可靠性;③采用双分区固件升级策略,通过Bootloader层对固件升级包执行CRC−32循环冗余校验与SHA−256哈希双重完整性验证,确保升级失败时能自动回滚至备分区的稳定版本。试验结果表明,无论在终端稀疏区还是终端密集区,该系统的最大定位误差均控制在30 cm以内,固件升级成功率达到100%,充分验证了该双模冗余升级架构在精准定位、升级效率、安全可靠性等方面的综合优势。 展开更多
关键词 UWB LoRa 固件无线升级 双模冗余升级 RSA+AES混合加密 自适应固件获取
在线阅读 下载PDF
医院网络安全体系中敏感数据加密传输的关键技术应用
13
作者 杨蕊 《数字通信世界》 2026年第2期94-96,共3页
医疗信息系统中涉及的患者隐私档案、电子病历以及医学影像等敏感数据,可依据其安全等级进行分类管理,不同类别的数据在传输环节之中,对于加密强度与响应速率的要求各有不同。针对医院网络环境下敏感数据所面临的泄露与篡改风险,文章从R... 医疗信息系统中涉及的患者隐私档案、电子病历以及医学影像等敏感数据,可依据其安全等级进行分类管理,不同类别的数据在传输环节之中,对于加密强度与响应速率的要求各有不同。针对医院网络环境下敏感数据所面临的泄露与篡改风险,文章从RSA-AES混合加密算法的适配应用、动态密钥生成策略、医学影像的分块加密传输技术以及数据完整性验证与异常检测机制四个方面开展技术设计,并通过模拟实验对比不同加密方案在安全保障与传输效率上的表现。 展开更多
关键词 医院网络安全 敏感数据分级 混合加密算法 动态密钥管理 分块加密传输
在线阅读 下载PDF
基于WebSocket的热电厂调度通信数据实时传输与异常检测策略
14
作者 张庆根 《电气应用》 2026年第2期106-114,共9页
随着城市化水平提升和集中供热的迅速发展,热电厂调度运行面临着数据量剧增、通信时延要求高、异常情况复杂等挑战。传统的轮询通信方式存在时延长、资源消耗大、难以实时响应异常等问题。提出一种基于WebSocket的热电厂调度通信数据实... 随着城市化水平提升和集中供热的迅速发展,热电厂调度运行面临着数据量剧增、通信时延要求高、异常情况复杂等挑战。传统的轮询通信方式存在时延长、资源消耗大、难以实时响应异常等问题。提出一种基于WebSocket的热电厂调度通信数据实时传输与异常检测策略,采用全双工通信机制建立长连接通道,结合RSAAES-RC4混合加密方案保障数据安全,构建多维度异常检测机制,实现对传输异常、设备状态异常和负荷分配异常的实时监测。仿真结果表明,所提策略在5 000个数据包场景下,网络流量开销仅为0.076 5 MB/s,平均传输延迟降低至252 ms,异常检测准确率达到94.3%,能够有效提升热电厂调度的实时性和可靠性。 展开更多
关键词 WebSocket 热电厂调度 实时传输 异常检测 全双工通信 混合加密
原文传递
DES-RSA的混合加密技术在数据库中的研究与应用 被引量:1
15
作者 兰洁 《电子测试》 2015年第9期41-43,共3页
伴随着科技的不断发展和突破,信息化技术也实现了自身的优化和提升,计算机技术以及互联信息化应用是其基础和平台。网络应用的高程度普及,给人们生活工作带来许多的帮助,但同时在这种良好的氛围之下,网络安全的隐患也是迫切需要去重视... 伴随着科技的不断发展和突破,信息化技术也实现了自身的优化和提升,计算机技术以及互联信息化应用是其基础和平台。网络应用的高程度普及,给人们生活工作带来许多的帮助,但同时在这种良好的氛围之下,网络安全的隐患也是迫切需要去重视的。本文就当前网络安全问题之中,对于信息数据的保密工作所主要应用的技术DES-RSA加密体制,在实际应用中所发挥出的有效作用进行了分析和解读,同时笔者就当前社会发展实际对于网络安全的新要求,提出了[1]DES-RSA加密技术的混合应用,在结合大量理论研究和实例探究的基础上提出了一些具体的应用措施,藉此提供分享。 展开更多
关键词 数据加密 混合加密 探究及应用
在线阅读 下载PDF
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
16
作者 Pawan Kumar Vipin Saxena 《Journal of Computer and Communications》 2024年第2期201-210,共10页
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone... Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs. 展开更多
关键词 encryption DECRYPTION DNA Paillier Cryptography Nested Levels hybrid Cryptography
在线阅读 下载PDF
基于DES-RSA混合加密的通信网络自主防御数据安全传输方法
17
作者 王新中 《计算机应用文摘》 2024年第17期180-182,185,共4页
信息,识别低维数据中的敏感数据,再结合信道带宽设计数据安全传输协议。基于此,采用DES对原始数据进行加密和解密,引入RSA对DES进行二次加密,生成公共密钥,通过逐层加密获得数据的安全传输向量,从而构建数据安全传输机制,实现通信网络... 信息,识别低维数据中的敏感数据,再结合信道带宽设计数据安全传输协议。基于此,采用DES对原始数据进行加密和解密,引入RSA对DES进行二次加密,生成公共密钥,通过逐层加密获得数据的安全传输向量,从而构建数据安全传输机制,实现通信网络自主防御的数据安全传输。实例应用结果显示,所提方法在数据传输安全系数和传输安全性方面表现优越。 展开更多
关键词 des-rsa混合加密 通信网络 自主防御数据 安全传输 安全系数
在线阅读 下载PDF
物联网混合传感节点数据存储二次增强加密方法设计
18
作者 龚发根 何拥军 钟少宏 《传感技术学报》 北大核心 2025年第11期2088-2093,共6页
物联网混合传感节点涵盖多个传感器,每个传感器的数据量庞大,且易包含大量敏感信息。为了提高物联网混合传感节点数据存储的安全性,提出一种物联网混合传感节点数据存储二次增强加密方法。采用神经网络和复合离散混沌系统,初始加密传感... 物联网混合传感节点涵盖多个传感器,每个传感器的数据量庞大,且易包含大量敏感信息。为了提高物联网混合传感节点数据存储的安全性,提出一种物联网混合传感节点数据存储二次增强加密方法。采用神经网络和复合离散混沌系统,初始加密传感器节点数据,结合AES算法和ECC算法,二次加密传感器节点数据。将密文、AES密钥块和签名块直接传输至接收端,实现物联网混合传感节点数据二次增强加密。仿真结果表明,所提方法的密钥生成时间和加密时间始终在280 ms以下,存储开销低于1.6×10^(4) byte,信息泄露比低于0.13,能够有效降低加密过程执行时间、数据存储开销和信息泄露比,保护物联网混合传感节点数据,提高物联网混合传感节点数据存储安全性。 展开更多
关键词 混合传感节点 增强加密 AES算法 ECC算法 物联网 数据存储
在线阅读 下载PDF
利用盲签名+洋葱路由的匿名服务器访问方案
19
作者 李猛 李晓宇 《计算机工程与设计》 北大核心 2025年第6期1664-1669,共6页
为保护注册用户的身份和IP地址隐私,提出一种结合盲签名和洋葱路由的匿名访问方案。用户通过盲签名技术从服务器获取假名ID,并用此假名ID访问服务器,确保服务器能验证ID合法性但无法识别用户真实身份。用户通过假名ID访问服务器时使用... 为保护注册用户的身份和IP地址隐私,提出一种结合盲签名和洋葱路由的匿名访问方案。用户通过盲签名技术从服务器获取假名ID,并用此假名ID访问服务器,确保服务器能验证ID合法性但无法识别用户真实身份。用户通过假名ID访问服务器时使用洋葱路由技术,使请求经过多个中转节点后到达服务器,确保服务器和中转节点均无法获取用户的IP地址。方案整合盲签名技术和洋葱路由技术,使合法的注册用户在访问服务器时其真实身份和IP地址均保持匿名,有效保护用户的隐私。 展开更多
关键词 网络安全 混合加密 洋葱路由 匿名通信 健壮性 盲签名 匿名访问
在线阅读 下载PDF
基于流序列特征融合与注意力机制的加密流量分类方法 被引量:1
20
作者 李志远 吴安昊 +1 位作者 谭林 卜凡亮 《小型微型计算机系统》 北大核心 2025年第7期1718-1726,共9页
现有加密流量分类方法中对缺少对流量字节本身特征的研究,存在特征冗余、流量表征方式不全面和公开数据集中样本分布不平衡等问题.为解决上述问题,本文提出了一种基于流序列特征融合与注意力机制的加密流量分类方法SFAN(Stream Feature ... 现有加密流量分类方法中对缺少对流量字节本身特征的研究,存在特征冗余、流量表征方式不全面和公开数据集中样本分布不平衡等问题.为解决上述问题,本文提出了一种基于流序列特征融合与注意力机制的加密流量分类方法SFAN(Stream Feature Attention Network).首先,针对特征冗余问题,提出了一个基于混合神经网络的特征提取方法;其次,针对流量表征问题,结合流量原始字节序列与数据包长度序列表征网络流量,再利用注意力机制衡量不同特征的重要性;最后,针对公开数据集中样本分布不平衡的问题,在模型训练层面优化损失函数提高分类精度.利用公开数据集ISCX VPN-nonVPN进行了广泛的实验,SFAN的总体准确率达到98.49%,F1值为98.03%.实验表明,所提出的加密流量分类方法能够有效识别不同应用程序产生的网络流量. 展开更多
关键词 加密流量分类 混合神经网络 多维度特征融合 注意力机制
在线阅读 下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部