期刊文献+
共找到244篇文章
< 1 2 13 >
每页显示 20 50 100
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
1
作者 Zhenjiang Dong Xin Ge +2 位作者 Yuehua Huang Jiankuo Dong Jiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4021-4044,共24页
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W... This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications. 展开更多
关键词 secure two-party computation embedded GPU acceleration privacy-preserving machine learning edge computing
在线阅读 下载PDF
Secure Signature Protocol 被引量:3
2
作者 Shundong LI Daoshun WANG Yiqi DAI 《Intelligent Information Management》 2009年第3期174-179,共6页
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by ... This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private. 展开更多
关键词 CRYPTOGRAPHY secure computation SIGNATURE SERVICE protocol
在线阅读 下载PDF
An Effective Security Comparison Protocol in Cloud Computing 被引量:1
3
作者 Yuling Chen Junhong Tao +2 位作者 Tao Li Jiangyuan Cai Xiaojun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第6期5141-5158,共18页
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses ... With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data. 展开更多
关键词 secure comparison protocols zero-knowledge proof homomorphic encryption cloud computing
在线阅读 下载PDF
Secure planar convex hull protocol for large-scaled point sets in semi-honest model
4
作者 孙茂华 Zhu Hongliang Li Qi 《High Technology Letters》 EI CAS 2015年第4期471-478,共8页
Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has... Efficiency and scalability are still the bottleneck for secure multi-party computation geometry (SMCG). In this work a secure planar convex hull (SPCH) protocol for large-scaled point sets in semi-honest model has been proposed efficiently to solve the above problems. Firstly, a novel priva- cy-preserving point-inclusion (PPPI) protocol is designed based on the classic homomorphic encryp- tion and secure cross product protocol, and it is demonstrated that the complexity of PPPI protocol is independent of the vertex size of the input convex hull. And then on the basis of the novel PPPI pro- tocol, an effective SPCH protocol is presented. Analysis shows that this SPCH protocol has a good performance for large-scaled point sets compared with previous solutions. Moreover, analysis finds that the complexity of our SPCH protocol relies on the size of the points on the outermost layer of the input point sets only. 展开更多
关键词 secure multi-party computation secure multi-party computational geometry (SMCG) secure planar convex hull protocol (SPCH) privacy-preserving point-inclusion protocol (PPPI) semi-honest model
在线阅读 下载PDF
SPEP: Security Protocol to Enhance Privacy in Pervasive Computing
5
作者 YANG Fan PU Fang CAO Qi-ying LI Tong 《通讯和计算机(中英文版)》 2007年第1期27-34,共8页
关键词 安全协议 私密性 计算机 SPEP
在线阅读 下载PDF
Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks 被引量:7
6
作者 Haiping Huang Tianhe Gong +2 位作者 Ping Chen Reza Malekian Tao Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第4期385-396,共12页
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation ... Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks. 展开更多
关键词 secure two-party computation PRIVACY-PRESERVING wireless sensor networks scalar product distancecalculation privacy homomorphism
原文传递
A survey of edge computing-based designs for IoT security 被引量:15
7
作者 Kewei Sha T.Andrew Yang +1 位作者 Wei Wei Sadegh Davari 《Digital Communications and Networks》 SCIE 2020年第2期195-202,共8页
Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physi... Pervasive IoT applications enable us to perceive,analyze,control,and optimize the traditional physical systems.Recently,security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications.As an extension of the cloud,the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications.Although there are some research efforts in this area,edge-based security designs for IoT applications are still in its infancy.This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs.We first present an edge-centric IoT architecture.Then,we extensively review the edge-based IoT security research efforts in the context of security architecture designs,firewalls,intrusion detection systems,authentication and authorization protocols,and privacy-preserving mechanisms.Finally,we propose our insight into future research directions and open research issues. 展开更多
关键词 Edge computing Internet of Things(IoT) securITY Architecture secure protocols FIREWALL Intrusion detection Authentication AUTHORIZATION Privacy
在线阅读 下载PDF
Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing
8
作者 刘晓 蒋睿 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期392-397,共6页
The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the cod... The resilient storage outsourcing schemes in mobile cloud computing are analyzed. It is pointed out that the sharing-based scheme (ShS) has vulnerabilities regarding confidentiality and integrity; meanwhile, the coding-based scheme (COS) and the encryption-based scheme (EnS) have vulnerabilities on integrity. The corresponding attacks on these vulnerabilities are given. Then, the improved protocols such as the secure sharing-based protocol (SShP), the secure coding-based protocol (SCoP) and the secure encryption- based protocol (SEnP), are proposed to overcome these vulnerabilities. The core elements are protected through public key encryptions and digital signatures. Security analyses show that the confidentiality and the integrity of the improved protocols are guaranteed. Meanwhile, the improved protocols can keep the frame of the former schemes and have higher security. The simulation results illustrate that compared with the existing protocols, the communication overhead of the improved protocols is not significantly increased. 展开更多
关键词 mobile cloud computing cloud storage security protocols
在线阅读 下载PDF
Model Checking Electronic CommerceSecurity Protocols Based on CTL 被引量:1
9
作者 XIAO De-qin ZHANG Huan—guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期333-337,共5页
We present a model based on Computational Temporal Logic(CTL)methods forverifying security requirements of electronic commerce,protocols.The model describes formally theauthentication,confidentiality integrity,non-rep... We present a model based on Computational Temporal Logic(CTL)methods forverifying security requirements of electronic commerce,protocols.The model describes formally theauthentication,confidentiality integrity,non-repudiation denial of serviee and access control ofthe e-lectronic commerce protocols.We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover,we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user.And also,we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce. 展开更多
关键词 E-commercc security protocols formal methods computational temporal logic
在线阅读 下载PDF
Edge-Computing with Graph Computation:A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN 被引量:1
10
作者 Rashid Amin Mudassar Hussain +3 位作者 Mohammed Alhameed Syed Mohsan Raza Fathe Jeribi Ali Tahir 《Computers, Materials & Continua》 SCIE EI 2020年第12期1869-1890,共22页
Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.A... Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller.This data processing at the edge nodes reduces the latency and bandwidth requirements.In SDN,the controller is a single point of failure.Several security issues related to the traditional network can be solved by using SDN central management and control.Address Spoofing and Network Intrusion are the most common attacks.These attacks severely degrade performance and security.We propose an edge computing-based mechanism that automatically detects and mitigates those attacks.In this mechanism,an edge system gets the network topology from the controller and the Address Resolution Protocol(ARP)traffic is directed to it for further analysis.As such,the controller is saved from unnecessary processing related to addressing translation.We propose a graph computation based method to identify the location of an attacker or intruder by implementing a graph difference method.By using the correct location information,the exact attacker or intruder is blocked,while the legitimate users get access to the network resources.The proposed mechanism is evaluated in a Mininet simulator and a POX controller.The results show that it improves system performance in terms of attack mitigation time,attack detection time,and bandwidth requirements. 展开更多
关键词 Software Defined Networking(SDN) edge computing Address Resolution protocol(ARP) ARP inspection security graph difference
在线阅读 下载PDF
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
11
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Secure Two-Party Computational Geometry 被引量:37
12
作者 Shun-DongLi Yi-QiDai 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期258-263,共6页
Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a c... Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric. problems, and in doing so a building block is developed, the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems. 展开更多
关键词 secure multi-party computation oblivious transfer millionaire problem secure computation geometry protocol
原文传递
Integration of Fog Computing for Health Record Management Using Blockchain Technology 被引量:1
13
作者 Mesfer AI Duhayyim Fahd N.Al-Wesabi +5 位作者 Radwa Marzouk Abdalla Ibrahim Abdalla Musa Noha Negm Anwer Mustafa Hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第5期4135-4149,共15页
Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, ... Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000. 展开更多
关键词 Fog computing IoMT block chain YAC security IOT consensus protocol
在线阅读 下载PDF
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
14
作者 Chen Ping Ji Yimu +2 位作者 Wang Ruchuan Huang Haiping Zhang Dan 《Journal of Electronics(China)》 2013年第2期190-197,共8页
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. 展开更多
关键词 secure multi-party computation PRIVACY-PRESERVING Euclid-distance protocol Wireless Sensor Networks (WSNs) Density-Based Clustering protocol (DBCP)
在线阅读 下载PDF
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
15
作者 A.S.Anakath S.Ambika +2 位作者 S.Rajakumar R.Kannadasan K.S.Sendhil Kumar 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期833-847,共15页
Cloud computing becomes an important application development platform for processing user data with high security.Service providers are accustomed to providing storage centers outside the trusted location preferred by... Cloud computing becomes an important application development platform for processing user data with high security.Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner.Thus,ensuring the security and confidentiality of the data while processing in the centralized network is very difficult.The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network.Intruders are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud network.In this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in M-Healthcare.Conditions of patients are monitored using wireless sensor devices and are then transferred to the server.Kerberos protocol helps in avoiding unnecessary communication of authenticated data over the cloud network.Biometric security process is a procedure with the best security in most of the authentication field.Trust node is responsible in carrying data packets from the sender to the receiver in the cloud network.The Kerberos protocol is used in trust node to ensure security.Secured communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and receiver.The computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods. 展开更多
关键词 protocol security m-health cloud computing BIOMETRIC FINGERPRINT kerberos protocol
在线阅读 下载PDF
云辅助的隐私保护网约车匹配方案
16
作者 赖成喆 马吉平 +1 位作者 秦宝东 郑东 《西安邮电大学学报》 2025年第4期87-96,共10页
为了解决乘客和网约车在乘车匹配中的隐私泄露问题,提出一种云辅助的隐私保护网约车匹配方案。该方案采用高效多方委托计算密码原语,使乘客和网约车利用各自的密钥加密消息。将云服务器与密码服务提供商进行协作,共同计算乘客和网约车... 为了解决乘客和网约车在乘车匹配中的隐私泄露问题,提出一种云辅助的隐私保护网约车匹配方案。该方案采用高效多方委托计算密码原语,使乘客和网约车利用各自的密钥加密消息。将云服务器与密码服务提供商进行协作,共同计算乘客和网约车之间的道路距离,并通过密文打包技术减小通信和计算开销,利用道路网络嵌入技术提高匹配的准确性。此外,设计安全比较协议,在密文状态下安全高效计算数据中的最大值或最小值,用于计算乘客与网约车之间的道路距离以及在多个候选网约车中识别最近的网约车。安全性分析和性能分析结果表明,该方案能够在不泄露用户具体位置信息的前提下,有效地为乘客匹配最近的网约车,与现有相关方案相比,具有更优的通信和计算开销。 展开更多
关键词 网约车匹配 隐私保护 多方委托计算 道路网络嵌入技术 安全比较协议
在线阅读 下载PDF
高精度可扩展的密态隐私保护语音分类
17
作者 王雷蕾 宋考 +2 位作者 张媛媛 毕仁万 熊金波 《计算机科学与探索》 北大核心 2025年第2期528-538,共11页
为解决现有全同态加密技术在语音分类任务中计算效率和分类准确率均较低的挑战,提出一种高精度可扩展的密态隐私保护语音分类PPSC方案。设计基于CKKS全同态加密技术两方服务器协同的安全乘法协议,因避免使用昂贵的自举操作,可有效提升... 为解决现有全同态加密技术在语音分类任务中计算效率和分类准确率均较低的挑战,提出一种高精度可扩展的密态隐私保护语音分类PPSC方案。设计基于CKKS全同态加密技术两方服务器协同的安全乘法协议,因避免使用昂贵的自举操作,可有效提升深层次密文乘法的计算效率,从而使得方案可扩展到更深层次的神经网络;基于上述架构设计安全指数、安全倒数以及安全比较等安全非多项式协议,相较于多项式近似拟合非多项式运算的方法,在提高计算精度的同时,降低了计算开销。安全实现卷积层、ReLU层、平均池化层、全连接层、Softmax层等PPSC方案的基本模块,确保语音数据、语音模型和中间计算结果的隐私性。从有效性和安全性等维度对PPSC方案进行了详尽的理论分析,证明安全乘法协议在更深层次的乘法运算中具有更高的运算效率。在Speech Command Database语音数据集上的实验结果表明,PPSC方案可以在保护数据和模型参数隐私的情况下实现有效的语音分类,其准确率相比于HEKWS方案提高3.57个百分点。 展开更多
关键词 全同态加密 隐私保护 两方协同 语音分类 安全计算协议
在线阅读 下载PDF
云计算环境下基于Syslog网络安全监测系统研究 被引量:1
18
作者 苏志强 《成都工业学院学报》 2025年第5期44-49,共6页
针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数... 针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数据采集器和云计算处理器。在软件算法层面上,利用云计算技术采集并提取网络日志数据特征,计算网络日志数据特征的Syslog协议匹配度,采用特征匹配的方式获取网络安全状态监测结果。通过系统测试实验得出结论:与传统系统相比,优化设计监测系统的漏报率与误报率均被控制在10%以下。 展开更多
关键词 云计算环境 Syslog协议 网络安全 网络日志 安全监测系统
在线阅读 下载PDF
Two-party certificateless authenticated key agreement protocol with enhanced security 被引量:5
19
作者 Wu Tao Jing Xiaojun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第1期12-20,39,共10页
Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is ... Two-party certificateless authenticated key agreement(CL-AKA) protocol is a hot topic in the field of wireless communication security. An improved two-party CL-AKA protocol with enhanced security is proposed,which is of provable security and unforgeability in the extended Canetti-Krawczyk(eCK) security model based on the hardness assumption of the computational Diffie Hellman(CDH) problem. Compared with other similar protocols, it is more efficient and can satisfy security properties such as free of the centralized management of certificate and key, free of bilinear pairings, two-party authentication, resistant to unknown key-share attack, key compromise impersonation attacks, the man-in-the-middle-attack(MIMA) of key generation center(KGC), etc. These properties make the proposed protocol have better performance and adaptability for military communication. 展开更多
关键词 CERTIFICATELESS cryptography authenticated key AGREEMENT protocol two-party authentication protocol securITY properties
原文传递
A Secure Scalar Product Protocol Against Malicious Adversaries 被引量:3
20
作者 Bo Yang Yong Yu Chung-Huang Yang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期152-158,共7页
A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors... A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs. 展开更多
关键词 secure multi-party computation secure scalar product protocol verifiable encryption
原文传递
上一页 1 2 13 下一页 到第
使用帮助 返回顶部