期刊文献+
共找到2,035篇文章
< 1 2 102 >
每页显示 20 50 100
A Collaborative Protection Mechanism for System-on-Chip Functional Safety and Information Security in Autonomous Driving
1
作者 Zhongyi Xu Lei Xin +1 位作者 Zhongbai Huang Deguang Wei 《Journal of Electronic Research and Application》 2025年第2期226-232,共7页
This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i... This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements. 展开更多
关键词 Autonomous driving SoC functional safety Information security Collaborative protection mechanism Collaborative protection architecture
在线阅读 下载PDF
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functions 被引量:13
2
作者 Liang Jin Xiaoyan Hu +4 位作者 Yangming Lou Zhou Zhong Xiaoli Sun Huiming Wang Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第9期88-99,共12页
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm... The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed. 展开更多
关键词 wireless communication endogenous security information security functional safety
在线阅读 下载PDF
Providing Customized Security Based on Network Function Composition and Reconfiguration 被引量:2
3
作者 HU Yuxiang LI Yufeng +1 位作者 XING Chiqiang LIAO Jianxin 《China Communications》 SCIE CSCD 2016年第S1期177-189,共13页
Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMN... Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs. 展开更多
关键词 consumer-centric MULTIMEDIA NETWORK customized security NETWORK function combination service processing CHAIN
在线阅读 下载PDF
Security Enhancement of Arbiter-Based Physical Unclonable Function on FPGA 被引量:1
4
作者 WANG Jun LIU Shubo +1 位作者 XIONG Xingxing LIANG Cai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期127-133,共7页
In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the un... In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%. 展开更多
关键词 physical unclonable function METASTABILITY balanced D flip-flop field programmable gate arrays (FPGA) security
原文传递
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
5
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis
6
作者 Zhongxu Yin Yiran Song +1 位作者 Huiqin Chen Yan Cao 《Computers, Materials & Continua》 SCIE EI 2020年第5期1013-1029,共17页
Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pat... Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analyzing of conditions,resulting in higher false positive rate or false negative rate,which increased manual confirmation workload.In this paper,we propose a security sensitive function mining approach based on preconditon pattern analyzing.Firstly,we propose an enhanced system dependency graph analysis algorithm for precisely extracting the conditional statements which check the function parameters and conducting statistical analysis of the conditional statements for selecting candidate security sensitive functions of the target program.Then we adopt a precondition pattern mining method based on conditional statements nomalizing and clustering.Functions with fixed precondition patterns are regarded as security-sensitive functions.The experimental results on four popular open source codebases of different scales show that the approach proposed is effective in reducing the false positive rate and false negative rate for detecting security sensitive functions. 展开更多
关键词 Code mining security sensitive function function preconditions single-linkage clustering
在线阅读 下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
7
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
在线阅读 下载PDF
Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning 被引量:1
8
作者 Shuangxing Deng Man Li Huachun Zhou 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2919-2939,共21页
Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions... Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions.Security SFC can be deployed according to requirements,but the current SFC is not flexible enough and lacks an effective feedback mechanism.The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid.How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue.Our contribution is threefold.First,we propose a secure SFC path selection framework.The framework can accept the feedback results of traffic and security service functions in SFC,and dynamically select the opti-mal path for SFC based on the feedback results.It also realizes the automatic deployment of paths,forming a complete closed loop.Second,we expand the protocol of SFC to realize the security SFC with branching path,which improve flexibility of security SFC.Third,we propose a deep reinforcement learning-based dynamic path selection method for security SFC.It infers the optimal branching path by analyzing feedback from the security SFC.We have experimented with Distributed Denial of Service(DDoS)attack detection modules as security service functions.Experimental results show that our proposed method can dynamically select the optimal branching path for a security SFC based on traffic features and the state of the SFC.And it improves the accuracy of the overall malicious traffic detection of the security SFC and significantly reduces the latency and overall load of the SFC. 展开更多
关键词 Service function chaining deep reinforcement learning security service
在线阅读 下载PDF
Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming 被引量:3
9
作者 Song Deng Dong Yue +1 位作者 Xiong Fu Aihua Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期431-439,共9页
Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid i... Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality. © 2014 Chinese Association of Automation. 展开更多
关键词 Algorithms Electric power system security Gene expression GENES Rough set theory
在线阅读 下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
10
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
在线阅读 下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
11
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 Network application network function virtualization machine learning security 5G
在线阅读 下载PDF
An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model
12
作者 Jun Zhang Hao Xiao +1 位作者 Hongqun Zhai Xiaoli Meng 《Computers, Materials & Continua》 SCIE EI 2020年第4期301-313,共13页
Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potent... Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes. 展开更多
关键词 Blind signature quantum superposition decoy qubit hash function relaxed security model
在线阅读 下载PDF
A Study of Secure Multi-Party Elementary Function Computation Protocols 被引量:1
13
作者 Wenjun Luo Xiang Li 《通讯和计算机(中英文版)》 2005年第5期32-40,共9页
关键词 安全系统 操作系统 基础功能 计算机设备安全
在线阅读 下载PDF
Function and Role of China's Securities Market
14
作者 Wenxian Zhang 《Chinese Business Review》 2004年第11期14-17,共4页
The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself.I... The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself.In addition,the primary factor of mature securities market is perfect and integrated function of the securities market.Afterwards,the article analyses the static and dynamic function of the securities market.At last,it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role,market function location,development goal and the mode of securities market if the function of China's securities market is to be exerted properly. 展开更多
关键词 securITIES market government role function
在线阅读 下载PDF
Concepts of Safety Critical Systems Unification Approach &Security Assurance Process
15
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Umar Mahmood Usman Iqbal 《Journal of Information Security》 2020年第4期292-303,共12页
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon... The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems. 展开更多
关键词 System security Assurance of Component function Safety-Critical Software Software Assurance
在线阅读 下载PDF
Finding Food Security through Changing the Agricultural Model to Sustain Insect Biodiversity
16
作者 Astrid Jankielsohn 《Advances in Entomology》 2021年第3期122-130,共9页
Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a chan... Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a changing climate, biodiversity loss, human population growth and food production for this growing population. Agricultural intensification contributes significantly to biodiversity loss. The agricultural model for our current food production systems is mainly based on the Green Revolution, which promoted the cultivation of crops in extensive monoculture fields and intensified external inputs of agrochemicals. This model resulted in biodiversity loss, particularly in insect populations. A model based on ecological intensification as an alternative to agricultural intensification with minimized use of agro-inputs may slow the rate of biodiversity loss resulting in more sustainable agricultural ecosystems. 展开更多
关键词 Food security Agricultural Model Biodiversity Loss Climate Change Ecological Intensification INSECTS Ecosystem functioning Human Population Increase
在线阅读 下载PDF
HS1 Enhances Rice Heat Tolerance Through Maintenance of Chloroplast Function and Reactive Oxygen Species Homeostasis
17
作者 WANG An SHAO Zhengji +5 位作者 LIU Ying ZHANG Guangheng ZHU Li HU Jiang QIAN Qian REN Deyong 《Rice science》 2025年第6期751-755,I0007-I0017,共16页
Global warming poses a severe threat to rice production and food security.We identified a heat-sensitive mutant hs1 through largescale screening of an established rice mutant library,and subsequently cloned the corres... Global warming poses a severe threat to rice production and food security.We identified a heat-sensitive mutant hs1 through largescale screening of an established rice mutant library,and subsequently cloned the corresponding gene HS1,which confers thermotolerance in rice.HS1 is localized to the chloroplast and functions by preserving chloroplast integrity under elevated temperatures through stabilizing the photosystem I subunit protein PsaC.Loss of HS1 function in the hs1 mutant leads to severe structural damage to the chloroplast under heat stress,accompanied by intracellular accumulation of reactive oxygen species(ROS),which in turn triggers DNA damage and leaf albinism,ultimately manifesting as a heat-sensitive phenotype. 展开更多
关键词 heat tolerance global warming chloroplast function reactive oxygen species heat sensitive mutant food security HOMEOSTASIS rice production
在线阅读 下载PDF
所有权保留买卖的法律构造之争
18
作者 谢鸿飞 《浙江社会科学》 北大核心 2026年第2期4-17,155,共15页
所有权保留买卖是《民法典》第388条规定的其他具有担保功能的合同。立法的混合继受、司法解释之间的冲突,使以所有权保留买卖为代表的其他具有担保功能的合同成为我国持续争议的担保法主题,特别是如何界定出卖人的权利性质的法律构造... 所有权保留买卖是《民法典》第388条规定的其他具有担保功能的合同。立法的混合继受、司法解释之间的冲突,使以所有权保留买卖为代表的其他具有担保功能的合同成为我国持续争议的担保法主题,特别是如何界定出卖人的权利性质的法律构造之争。学界主要形成了所有权构成、担保权构成和综合构成三种学说,且各学说存在实质的法律效果差异。在物权法定框架下,三种学说源于如何解释所有权保留当事人的真实意图,以及国家强制介入的正当性及其程度。解释论和立法论的未来努力方向,应尽可能在内在体系与外在体系上,实现包括所有权保留在内的其他具有担保功能的合同的一致性和融贯性。 展开更多
关键词 其他具有担保功能的合同 所有权保留 担保性所有权 功能主义担保 取回权
在线阅读 下载PDF
新时期国土空间综合治理的理论框架与科学议题——基于统筹发展与安全的视角
19
作者 周侃 樊杰 +7 位作者 徐勇 李平星 王强 刘汉初 陶岸君 孙勇 张健 魏佳荣 《资源科学》 北大核心 2026年第1期1-13,共13页
面向新时期国土空间治理中非线性风险增强与人地系统复杂性凸显的双重挑战,本文融合人文地理学的地域功能理论、资源科学的要素流动配置分析以及生态学的生态系统服务流研究等多学科视角,构建了统筹高质量发展和高水平安全的国土空间综... 面向新时期国土空间治理中非线性风险增强与人地系统复杂性凸显的双重挑战,本文融合人文地理学的地域功能理论、资源科学的要素流动配置分析以及生态学的生态系统服务流研究等多学科视角,构建了统筹高质量发展和高水平安全的国土空间综合治理理论框架。该框架以地域功能时空优化与综合效益协调为核心,确立演进韧性增强与协同效率提升相结合的适应性治理导向,并强调通过培育新质生产力推动国土空间利用模式向创新驱动、场景融合与系统韧性并重转型。在此基础上,阐释了生态价值实现机制、资源要素优化配置、空间韧性治理、绿色低碳转型路径以及全周期智慧治理体系等科学议题。结合《资源科学》本期专刊《新时期国土空间综合治理理论与方法创新》相关实证研究,从微观主体行为响应、中观区域供需匹配与宏观空间形态演变3个尺度,验证了该理论框架在应对生态修复、食物系统转型、城市更新及能源结构优化等现实议题中的解释力与指导价值,旨在为构建安全、韧性、高效、绿色的中国式现代化国土空间格局提供理论依据与实践参考。 展开更多
关键词 国土空间综合治理 高质量发展 高水平安全 地域功能 空间均衡 新质生产力
原文传递
基于早期终止解码器的高效小型化PUF
20
作者 孟坤 许嘉鑫 王启源 《计算机工程与设计》 北大核心 2026年第2期459-465,共7页
信息安全在现代社会中至关重要,物理不可克隆函数(PUF)为密钥生成与管理提供了解决途径,而SRAM PUF因其易于集成和使用而受到青睐。因此利用独立SRAM芯片作为PUF单元,分析了基于模糊提取器的密钥提取方法,结合BCH编码和奇偶校验码,提出... 信息安全在现代社会中至关重要,物理不可克隆函数(PUF)为密钥生成与管理提供了解决途径,而SRAM PUF因其易于集成和使用而受到青睐。因此利用独立SRAM芯片作为PUF单元,分析了基于模糊提取器的密钥提取方法,结合BCH编码和奇偶校验码,提出了优化的BCH码Meggitt解码器的早期终止方法,并设计了一款小型SRAM PUF设备,结合HMAC技术实现了多挑战应答功能。实验结果表明,所设计的SRAM PUF设备性能优异,片内汉明权重为0.5185%,片间汉明距离为48.4075%。在常温下失败低于4.3×10^(-7),优化后的早期终止纠错方法使解码速度提升了10.10%,显著增强了设备的实际应用能力。 展开更多
关键词 信息安全 物理不可克隆函数 静态随机存取存储器 模糊提取器 纠错码 解码器 奇偶校验码
在线阅读 下载PDF
上一页 1 2 102 下一页 到第
使用帮助 返回顶部