期刊文献+
共找到152,003篇文章
< 1 2 250 >
每页显示 20 50 100
融合SM2轻量化公钥算法的SSL协议研究
1
作者 但波 熊开新 欧阳涛 《计算机应用文摘》 2026年第6期105-108,共4页
针对传统SSL协议在资源受限环境中计算开销大、认证与密钥协商效率低的问题,提出一种基于SM2轻量化公钥算法的优化方案。在身份认证与密钥交换中引入无证书密码机制,并结合预计算、模运算优化与SM3哈希算法降低运算复杂度。实验表明,该... 针对传统SSL协议在资源受限环境中计算开销大、认证与密钥协商效率低的问题,提出一种基于SM2轻量化公钥算法的优化方案。在身份认证与密钥交换中引入无证书密码机制,并结合预计算、模运算优化与SM3哈希算法降低运算复杂度。实验表明,该方案将认证延迟由250 ms降至160 ms,认证效率提升20%;密钥协商时延降低20%,系统吞吐率提升20%。在保证安全性的前提下,该方案显著提升了SSL在资源有限环境中的效率,适用于物联网与移动终端等高安全需求场景。 展开更多
关键词 ssl协议 SM2算法 轻量化公钥算法 身份认证 密钥协商
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
2
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
A Novel Signature-Based Secure Intrusion Detection for Smart Transportation Systems
3
作者 Hanaa Nafea Awais Qasim +3 位作者 Sana Abdul Sattar Adeel Munawar Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2026年第3期1309-1324,共16页
The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Tradit... The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Traditional intrusion detection systems have limitations in terms of centralized architecture,lack of transparency,and vulnerability to single points of failure.This is where the integration of blockchain technology with signature-based intrusion detection can provide a robust and decentralized solution for securing smart transportation systems.This study tackles the issue of database manipulation attacks in smart transportation networks by proposing a signaturebased intrusion detection system.The introduced signature facilitates accurate detection and systematic classification of attacks,enabling categorization according to their severity levels within the transportation infrastructure.Through comparative analysis,the research demonstrates that the blockchain-based IDS outperforms traditional approaches in terms of security,resilience,and data integrity. 展开更多
关键词 Smart transportation intrusion detection network security blockchain smart contract
在线阅读 下载PDF
Robust UAV-Assisted Jamming Secure Performance Improvement for Cognitive UAV Networks:Joint Resource Allocation and Trajectory Design
4
作者 Sun Ruomei Wu Yuhang +2 位作者 Tao Zhenhui Zhou Fuhui Wu Qihui 《China Communications》 2026年第2期137-149,共13页
Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum ... Cognitive unmanned aerial vehicle(UAV)is promising to tackle the spectrum scarcity problem faced by UAV communications.However,the secure information transmission is challenging due to the open nature of the spectrum sharing.In order to tackle this issue,a cognitive UAV network with cooperative jamming is studied in this paper.A robust resource allocation and trajectory joint optimization problem is formulated by considering the practical case that the channel state information(CSI)cannot be accurately obtained.An iterative algorithm is proposed to address this challenging non-convex problem.Simulation results demonstrate that the worst case robust resource allocation design can realize the secure communications even under the imperfect CSI.Moreover,compared with other benchmark schemes,the proposed scheme can achieve secure performance improvement. 展开更多
关键词 cognitive radio physical layer security robust design UAV communications
在线阅读 下载PDF
Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust Secure BERT Finetuning
5
作者 Nouman Ahmad Changsheng Zhang Uroosa Sehar 《Computers, Materials & Continua》 2026年第4期860-876,共17页
Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed too... Although Named Entity Recognition(NER)in cybersecurity has historically concentrated on threat intelligence,vital security data can be found in a variety of sources,such as open-source intelligence and unprocessed tool outputs.When dealing with technical language,the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques.We introduce a three-phase approach for improved NER inmulti-source cybersecurity data that makes use of large language models(LLMs).To ensure thorough entity coverage,our method starts with an identification module that uses dynamic prompting techniques.To lessen hallucinations,the extraction module uses confidence-based self-assessment and cross-checking using regex validation.The tagging module links to knowledge bases for contextual validation and uses SecureBERT in conjunction with conditional random fields to detect entity boundaries precisely.Our framework creates efficient natural language segments by utilizing decoderbased LLMs with 10B parameters.When compared to baseline SecureBERT implementations,evaluation across four cybersecurity data sources shows notable gains,with a 9.4%–25.21%greater recall and a 6.38%–17.3%better F1-score.Our refined model matches larger models and achieves 2.6%–4.9%better F1-score for technical phrase recognition than the state-of-the-art alternatives Claude 3.5 Sonnet,Llama3-8B,and Mixtral-7B.The three-stage architecture identification-extraction-tagging pipeline tackles important cybersecurity NER issues.Through effective architectures,these developments preserve deployability while setting a new standard for entity extraction in challenging security scenarios.The findings show how specific enhancements in hybrid recognition,validation procedures,and prompt engineering raise NER performance above monolithic LLM approaches in cybersecurity applications,especially for technical entity extraction fromheterogeneous sourceswhere conventional techniques fall short.Because of itsmodular nature,the framework can be upgraded at the component level as new methods are developed. 展开更多
关键词 Information extraction large language models NER open-source intelligence security automation
在线阅读 下载PDF
SSL加解密编排系统关键技术应用研究
6
作者 刘军 《电信快报》 2026年第1期9-13,共5页
在传统的安全设备和系统部署架构下,互联网络集约出口存在流量串接、管理、安全防护、加解密等诸多问题。文章利用SSL(安全套接层)加解密编排系统,重塑网络出口安全架构,使用安全设备资源池化、业务流量编排、数据流加解密等技术,提出... 在传统的安全设备和系统部署架构下,互联网络集约出口存在流量串接、管理、安全防护、加解密等诸多问题。文章利用SSL(安全套接层)加解密编排系统,重塑网络出口安全架构,使用安全设备资源池化、业务流量编排、数据流加解密等技术,提出新的安全架构的网络设计方案。该方案能减少不必要的设备性能损耗,提高流量处理和运维排障效率。 展开更多
关键词 ssl(安全套接层) 加解密 流量编排 互联网出口
在线阅读 下载PDF
A Comprehensive Survey on Blockchain-Enabled Techniques and Federated Learning for Secure 5G/6G Networks:Challenges,Opportunities,and Future Directions
7
作者 Muhammad Asim Abdelhamied A.Ateya +4 位作者 Mudasir Ahmad Wani Gauhar Ali Mohammed ElAffendi Ahmed A.Abd El-Latif Reshma Siyal 《Computers, Materials & Continua》 2026年第3期117-161,共45页
The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significa... The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks. 展开更多
关键词 5G/6G blockchain federated learning edge computing security
在线阅读 下载PDF
A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development
8
作者 Subhranshu Sekhar Tripathy Sujit Bebortta +3 位作者 Mazin Abed Mohammed Muhammet Deveci Haydar Abdulameer Marhoon Radek Martinek 《Digital Communications and Networks》 2026年第1期165-179,共15页
Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and... Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems.Fog computing offers a foundation for various applications,including cognitive support,health and social services,intelligent transportation systems,and pervasive computing and communications.Fog computing can help enhance these apps'productivity and lower the end-to-end delay experienced by such time-sensitive applications.In this research,we propose a reliable and secure service delivery strategy at the network edge for smart cities.To improve the availability and dependability,along with the security of smart city applications,the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system.Simulation findings suggest a reduction of 40.3%in the delay incurred by each service request for highly dense areas and 60.6%for moderately dense environments.Furthermore,the system has low false-negative rates and high detection and accuracy rates,decreasing service requests 2%. 展开更多
关键词 Security Reliability Trustworthy computing Resource provisioning Threat detection Fog computing Internet of things
在线阅读 下载PDF
Framework for Secure Substitution Box Construction and Its Application in Image Encryption
9
作者 Umar Hayat Ikram Ullah Muhammad Bilal 《Computers, Materials & Continua》 2026年第4期1428-1462,共35页
Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystem... Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks. 展开更多
关键词 Substitution box Mordell elliptic curve Mobius transformation NONLINEARITY image encryption CRYPTANALYSIS data security
在线阅读 下载PDF
Quantum-Resistant Secure Aggregation for Healthcare Federated Learning
10
作者 Chia-Hui Liu Zhen-Yu Wu 《Computers, Materials & Continua》 2026年第5期2116-2137,共22页
ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often inc... ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often incur nonnegligible computational and communication overhead when encryption is applied.At the same time,training high performance AI models requires large volumes of high quality data,while medical data such as patient information,clinical records,and diagnostic reports are highly sensitive and subject to strict privacy regulations,including HIPAA and GDPR.Traditional centralized machine learning approaches therefore pose significant challenges for cross institutional collaboration in healthcare.To address these limitations,Federated Learning was introduced to allow multiple institutions to jointly train a global model while keeping local data private.Nevertheless,conventional cryptographicmechanisms,such as RSA,are increasingly inadequate for privacy sensitive FL deployments,particularly in the presence of emerging quantum computing threats.Homomorphic encryption,which enables computations to be performed directly on encrypted data,provides an effective solution for preserving data privacy in federated learning systems.This capability allows healthcare institutions to securely perform collaborative model training while remaining compliant with regulatory requirements.Among homomorphic encryption techniques,NTRU,a lattice based cryptographic scheme defined over polynomial rings,offers strong resistance against quantum attacks by relying on the hardness of the Shortest Vector Problem(SVP).Moreover,NTRU supports limited homomorphic operations that are sufficient for secure aggregation in federated learning.In this work,we propose an NTRU enhanced federated learning framework specifically designed for medical and healthcare applications.Experimental results demonstrate that the proposed approach achieves classification performance comparable to standard federated learning,with final accuracy consistently exceeding 0.93.The framework introduces predictable encryption latency on the order of hundreds of milliseconds per training round and a fixed ciphertext communication overhead per client under practical deployment settings.In addition,the proposed systemeffectivelymitigatesmultiple security threats,including quantum computing attacks,by ensuring robust encryption throughout the training process.By integrating the security and homomorphic properties of NTRU,this study establishes a privacy preserving and quantumresistant federated learning framework that supports the secure,legal,and efficient deployment of AI technologies in healthcare,thereby laying a solid foundation for future intelligent healthcare systems. 展开更多
关键词 Federated learning(FL) homomorphic encryption NTRU cryptography healthcare data privacy quantum-resistant security
在线阅读 下载PDF
Secure Rate Maximization for UAV-RIS-Aided IoT Network in Smart Grid
11
作者 Jian Wu Xiaowei Hao Chao Han 《Energy Engineering》 2026年第3期215-231,共17页
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat... Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios. 展开更多
关键词 Smart grid Internet of Things unmanned aerial vehicles reconfigurable intelligent surface EAVESDROPPER secure capacity
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
12
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
A Blockchain-Based Hybrid Framework for Secure and Scalable Electronic Health Record Management in In-Patient Follow-Up Tracking
13
作者 Ahsan Habib Siam Md.Ehsanul Haque +3 位作者 Fahmid Al Farid Anindita Sutradhar Jia Uddin Sarina Mansor 《Computers, Materials & Continua》 2026年第3期798-822,共25页
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim... As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems. 展开更多
关键词 Electronic health records blockchain data security user access control QR code blockchain in healthcare medical data privacy
在线阅读 下载PDF
电子商务支付协议及发展趋势研究——SSL、SET与3D-Secure比较 被引量:4
14
作者 赵英 袁莉 《情报杂志》 CSSCI 北大核心 2006年第11期14-16,共3页
SSL、SET以及3D-Secure是目前电子商务支付中应用较多的几种协议,从功能、安全、加密和系统负载几方面对它们进行了较为全面的比较,总结了它们各自的优缺点,并在此基础上提出采用改进的SSL协议、采用SSL与SET相结合的方式和采用VISA验... SSL、SET以及3D-Secure是目前电子商务支付中应用较多的几种协议,从功能、安全、加密和系统负载几方面对它们进行了较为全面的比较,总结了它们各自的优缺点,并在此基础上提出采用改进的SSL协议、采用SSL与SET相结合的方式和采用VISA验证服务(即3D-Secure技术)是未来电子支付发展的趋势。 展开更多
关键词 ssl SET 3D—secure电子商务 支付协议 发展趋势
在线阅读 下载PDF
基于行动研究法的SECURE护理路径预防医疗器械压力性损伤研究 被引量:2
15
作者 刘立天 赵文利 +5 位作者 宋学莲 郑肖林 李英肖 李玉 张磊 张飞飞 《中国医学装备》 2025年第1期90-95,共6页
目的:探究基于行动研究法的皮肤和(或)组织、教育、合作、理解、报告和评价(SECURE)护理路径在重症监护室(ICU)患者医疗器械相关压力性损伤(MDRPI)预防过程中的应用效果。方法:基于行动研究法的SECURE护理路径包括成立皮肤护理小组发现... 目的:探究基于行动研究法的皮肤和(或)组织、教育、合作、理解、报告和评价(SECURE)护理路径在重症监护室(ICU)患者医疗器械相关压力性损伤(MDRPI)预防过程中的应用效果。方法:基于行动研究法的SECURE护理路径包括成立皮肤护理小组发现问题、制定干预计划实施和开展针对性护理干预预防MDRPI发生。选取2022年3月至2023年3月河北省人民医院ICU住院治疗的84例患者,按照随机数表法将其分为对照组和观察组,每组42例,对照组患者ICU治疗期间开展常规方式预防MDRPI,观察组采用行动研究法的SECURE护理路径开展预防。对比两组患者MDRPI发生率、ICU护理质量评分、患者生活质量简表-36(SF-36)评分、MDRPI患者改善情况评估及患者护理满意度。结果:观察组患者ICU治疗期间MDRPI发生率为4.76%(2/42),低于对照组的14.29%(6/42),差异有统计学意义(χ^(2)=11.052,P<0.05);观察组患者护理干预后的设备使用、预防评估、体位管理和预防护理平均评分分别为(88.45±2.05)、(89.36±2.11)、(89.25±2.15)和(91.45±2.25)分,均高于对照组,差异有统计学意义(t=11.425、12.052、10.052、13.478,P<0.05);观察组患者护理干预后SF-36量表的躯体功能、社会功能、心理功能和物质生活平均评分分别为(85.47±2.05)、(86.48±2.05)、(88.46±2.15)和(90.25±2.44)分,均高于对照组,差异有统计学意义(t=12.414、11.045、10.252、10.478,P<0.05);观察组患者MDRPI的发生时间、创面改善时间和ICU治疗时间分别为(4.05±0.54)、(3.45±0.15)和(8.12±2.14)d,发生时间多于对照组,而创面改善时间和ICU治疗时间少于对照组,差异有统计学意义(t=8.485、10.012、13.001,P<0.05);观察组患者的护理满意度为95.24%(40/42),高于对照组的83.33%(35/42),差异有统计学意义(χ^(2)=12.054,P<0.05)。结论:基于行动研究法的SECURE护理路径对ICU患者MDRPI预防进行干预,能够降低ICU患者MDRPI发生率,提升MDRPI护理工作质量,缩短ICU治疗时间,有助于ICU患者康复。 展开更多
关键词 行动研究法 secure护理路径 重症监护室(ICU)患者 医疗器械相关压力性损伤(MDRPI) 预防
暂未订购
Secure SSL/TLS Communication System Based on Quantum Keys 被引量:1
16
作者 WANG Jigang LU Yuqian +2 位作者 WEI Liping JIANG Xinzao ZHANG Han 《ZTE Communications》 2024年第3期106-115,共10页
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ... Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks. 展开更多
关键词 ssl/TLS protocols quantum key post-quantum cryptography
在线阅读 下载PDF
新基建背景下国密算法在高校网站SSL安全认证中的应用
17
作者 李书家 高琪娟 +2 位作者 刘乐群 季亚婷 卢朴 《合肥师范学院学报》 2025年第3期35-39,58,共6页
国密证书是基于国产SM2算法体系构建的、部署在服务器或国密网关上的安全套接层(Secure Socket Layer,SSL)证书,用以实现数据传输加密及服务器身份认证。采用“SM2/RSA双证书”认证模式,结合双证书、双算法模式以及国密应用生态支持体系... 国密证书是基于国产SM2算法体系构建的、部署在服务器或国密网关上的安全套接层(Secure Socket Layer,SSL)证书,用以实现数据传输加密及服务器身份认证。采用“SM2/RSA双证书”认证模式,结合双证书、双算法模式以及国密应用生态支持体系,构建了一套兼顾国密算法和RSA算法的解决方案,并在高校网站中使用国密算法实现了高强度SSL加密连接及服务器身份认证。实验结果表明,高校网站系统采用该方案后实现了从超文本传输安全协议(Hypertext Transfer Protocol Secure,HTTPS)到国密HTTPS的平滑过渡。在此模式下,高校网站系统的加密技术自主可控,保障了数据的机密性和完整性,在提升高校信息系统网络通信安全的同时,也为信息系统的国密改造奠定了研究基础。 展开更多
关键词 SM2 国密算法 数据加密 ssl加密 国密改造
在线阅读 下载PDF
Continuous-variable quantum secure direct communication based on N-APSK with Boltzmann-Maxwell distribution 被引量:1
18
作者 Zheng-Wen Cao Yu-Jie Zhang +4 位作者 Geng Chai Zhang-Tao Liang Xin-Lei Chen Lei Wang Yu-Jie Wang 《Chinese Physics B》 2025年第3期85-93,共9页
Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature... Continuous-variable quantum secure direct communication(CVQSDC)with Gaussian modulation(GM)demands a considerable quantity of random numbers during the preparation process and encodes them separately on the quadrature components of the quantum states.Hence,high-speed random number generators are required to satisfy this demand,which is difficult to implement in practical applications.CVQSDC with discrete modulation(DM),correspondingly,employs a finite number of quantum states to achieve encoding,which can circumvent the shortcomings of the GM scheme.Based on the advantages of DM,the issue of attaining the most optimal secrecy capacity and communication distance remains to be resolved.Here,we propose a CVQSDC protocol based on N-symbol amplitude phase shift keying(N-APSK),which exploits the Boltzmann-Maxwell distribution assisted probability shaping technique.In comparison with the uniform distribution,according to 32-APSK CVQSDC,the proposed scheme extends the communication distance by about 38%,while obtaining a higher secrecy capacity at the same communication distance.Furthermore,increasing the value of N will concurrently increase the quantity of rings in the constellation,thereby facilitating enhancements of communication distance.This work incorporates the modulation approaches prevalently employed in classical communication into the realm of quantum communication,attaining gratifying advancements in communication distance and secrecy capacity,and concurrently facilitating the integrated development of quantum communication and classical communication. 展开更多
关键词 quantum secure direct communication discrete-modulation amplitude phase shift keying Boltzmann-Maxwell distribution
原文传递
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks 被引量:1
19
作者 Xin Fan Guangkai Li +5 位作者 Jianqiang Li Yue Wang Chuanwen Luo Yi Hong Ting Chen Yan Huo 《Digital Communications and Networks》 2025年第3期925-936,共12页
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a... Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP. 展开更多
关键词 NOMA UAV COMP Physical layer security Stochastic geometry approaches Secrecy outage probability
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部