期刊文献+
共找到4,159篇文章
< 1 2 208 >
每页显示 20 50 100
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
1
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
Research on the Design of Ideological and Political Objective Matrix for Accounting English Course Based on OBE--with Reference to the Competency Framework of Certified Public Accountants
2
作者 Rui Huang 《Proceedings of Business and Economic Studies》 2025年第4期195-201,共7页
In recent years,the field of higher education in China has put forward clear requirements for the construction of ideological and political education in courses.Accounting English,as an important course for cultivatin... In recent years,the field of higher education in China has put forward clear requirements for the construction of ideological and political education in courses.Accounting English,as an important course for cultivating international accounting talents,urgently needs to integrate professional ethics and national consciousness into professional teaching[1].In response to the lack of a professional reference system for ideological and political education in accounting English courses,this paper,guided by the OBE educational concept,constructs a three-dimensional objective matrix model based on the international Certified Public Accountant(CPA)competency framework.By deconstructing the IFAC professional competence standards,a mapping mechanism of“professional competence-language carrier-ideological and political content”is proposed. 展开更多
关键词 OBE education Accounting English Course-based ideological and political education Certified public accountant Competency matrix
在线阅读 下载PDF
An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection
3
作者 Yiming Zhang Wei Zhang Cong Shen 《Computers, Materials & Continua》 2025年第11期3185-3211,共27页
Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protectio... Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protection and has attracted widespread attention.Consequently,research increasingly focuses on developing more secure FL techniques.However,in real-world scenarios involving malicious entities,the accuracy of FL results is often compromised,particularly due to the threat of collusion between two servers.To address this challenge,this paper proposes an efficient and verifiable data aggregation protocol with enhanced privacy protection.After analyzing attack methods against prior schemes,we implement key improvements.Specifically,by incorporating cascaded random numbers and perturbation terms into gradients,we strengthen the privacy protection afforded by polynomial masking,effectively preventing information leakage.Furthermore,our protocol features an enhanced verification mechanism capable of detecting collusive behaviors between two servers.Accuracy testing on the MNIST and CIFAR-10 datasets demonstrates that our protocol maintains accuracy comparable to the Federated Averaging Algorithm.In scheme efficiency comparisons,while incurring only a marginal increase in verification overhead relative to the baseline scheme,our protocol achieves an average improvement of 93.13% in privacy protection and verification overhead compared to the state-of-the-art scheme.This result highlights its optimal balance between overall overhead and functionality.A current limitation is that the verificationmechanismcannot precisely pinpoint the source of anomalies within aggregated results when server-side malicious behavior occurs.Addressing this limitation will be a focus of future research. 展开更多
关键词 Data fusion federated learning privacy protection MASKING verifiability fault tolerance
在线阅读 下载PDF
VSSTPM:Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications
4
作者 Ye Bai Debiao He +2 位作者 Zhichao Yang Xiaoying Jia Min Luo 《Digital Communications and Networks》 2025年第6期1783-1796,共14页
The Internet of Things(IoT)has become an integral part of daily life,making the protection of user privacy increasingly important.In gateway-based IoT systems,user data is transmitted through gateways to platforms,pus... The Internet of Things(IoT)has become an integral part of daily life,making the protection of user privacy increasingly important.In gateway-based IoT systems,user data is transmitted through gateways to platforms,pushing the data to various applications,widely used in smart cities,industrial IoT,smart farms,healthcare IoT,and other fields.Threshold Public Key Encryption(TPKE)provides a method to distribute private keys for decryption,enabling joint decryption by multiple parties,thus ensuring data security during gateway transmission,platform storage,and application access.However,existing TPKE schemes face several limitations,including vulnerability to quantum attacks,failure to meet Simulation-Security(SS)requirements,lack of verifiability,and inefficiency,which results in gateway-based IoT systems still being not secure and efficient enough.To address these challenges,we propose a Verifiable Simulation-Secure Threshold PKE scheme based on standard Module-LWE(VSSTPM).Our scheme resists quantum attacks,achieves SS,and incorporates Non-Interactive ZeroKnowledge(NIZK)proofs.Implementation and performance evaluations demonstrate that VSSTPM offers 112-bit quantum security and outperforms existing TPKE schemes in terms of efficiency.Compared to the ECC-based TPKE scheme,our scheme reduces the time cost for decryption participants by 72.66%,and the decryption verification of their scheme is 11 times slower than ours.Compared with the latest lattice-based TPKE scheme,our scheme reduces the time overhead by 90%and 48.9%in system user encryption and decryption verification,respectively,and their scheme is 13 times slower than ours in terms of decryption participants. 展开更多
关键词 IoT gateway TPKE Simulation-security Verifiable Standard module-LWE problem NIZK proof 112-Bit quantum security
在线阅读 下载PDF
Research on Efficient Storage Consistency Verification Technology for On-Chain and Off-Chain Data
5
作者 Wei Lin Yi Sun 《Computers, Materials & Continua》 2025年第12期5117-5134,共18页
To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data... To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data structure that is more suitable for streaming data to achieve efficient real-time verifiability for streaming data.Based on the notch gate hash function and vector commitment,an adaptive notch gate hash tree structure is constructed,and an efficient real-time verifiable data structure for on-chain and off-chain stream data is proposed.The structure binds dynamic root nodes sequentially to ordered leaf nodes in its child nodes.Only the vector commitment of the dynamic root node is stored on the chain,and the complete data structure is stored off-chain.This structure ensures tamperproofing against malicious off-chain cloud servers of off-chain cloud servers.Preserves storage scalability space,realizes the immediate verification of stream data upon arrival,and the computational overhead of on-chain and off-chain hybrid storage verification is only related to the current data volume,which is more practical when dealing with stream data with unpredictable data volume.We formalize this as an efficient real-time verification scheme for stream data in on-chain and off-chain hybrid storage.Finally,the technology’s security and performance were empirically validated through rigorous analysis. 展开更多
关键词 On-chain and off-chain hybrid storage verifiable technology slot gate hash function vector commitment
在线阅读 下载PDF
VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server
6
作者 Peizheng Lai Minqing Zhang +2 位作者 Yixin Tang Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第8期2935-2957,共23页
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i... Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension. 展开更多
关键词 Verifiable federated learning PRIVACY-PRESERVING homomorphic encryption reversible data hiding in encrypted domain secret sharing
在线阅读 下载PDF
水土保持碳汇项目的基线问题
7
作者 钟小剑 李智广 +5 位作者 成辉 吴娟 卢顺发 罗火钱 张美新 谢锦升 《中国水土保持科学》 北大核心 2026年第1期63-69,共7页
【目的】我国积极推进水土保持碳汇纳入到国家自愿温室气体减排交易机制,科学合理设定该类碳汇项目基线情景是这项工作的关键。国内外通常将未实施项目措施时项目区碳储量的可能变化情况作为碳汇项目基线。这给水土保持碳汇项目的基线... 【目的】我国积极推进水土保持碳汇纳入到国家自愿温室气体减排交易机制,科学合理设定该类碳汇项目基线情景是这项工作的关键。国内外通常将未实施项目措施时项目区碳储量的可能变化情况作为碳汇项目基线。这给水土保持碳汇项目的基线设置提供了基本思路。【方法】基于国家CCER方法学征集要求和国际通用方法,探讨水土保持碳汇项目基线问题,阐述其定义、特性、分类方式和核心原则。并分析基线情景确定方法,针对项目固碳途径,详细阐述不同情形基线的设置方法,并结合典型措施应用实例说明。【结果】1)通过严格基线调查设置的项目级基线是最具可行性。2)基于模型的预测可提高基准线一致性和透明度,但需校准且存在较大不确定性。3)区域或国家级基线可降低成本、简化论证,但缺乏地块代表性。4)提出“增绿增汇”“减蚀减排”“保土固碳”各固碳路径基线设置具体操作方法。5)通过案例展示实际应用。【结论】项目级基线方法便于量化水土保持措施的碳汇效益;科学合理设置基线对于水土保持碳汇项目的开发并融入碳市场具有决定性作用;将水土保持碳汇项目纳入碳市场有益于气候变化减缓和可持续土地管理奠定基础。 展开更多
关键词 水土保持碳汇 碳汇项目 基线 中国温室气体自愿减排交易机制
在线阅读 下载PDF
一种高效安全的联邦学习隐私保护方案
8
作者 宋成 樊源龙 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期12-19,共8页
针对联邦学习过程中设备的地理位置、网络状态、存储能力、计算能力、参数交换等多方面差异导致通信效率低、安全性能得不到保障的问题,提出了一种高效的联邦学习数据聚合隐私保护方案。方案通过参与客户端分组并选取组长减少与服务器... 针对联邦学习过程中设备的地理位置、网络状态、存储能力、计算能力、参数交换等多方面差异导致通信效率低、安全性能得不到保障的问题,提出了一种高效的联邦学习数据聚合隐私保护方案。方案通过参与客户端分组并选取组长减少与服务器之间的直接交互次数,运用梯度压缩技术减少客户端上传的参数量,提高通信效率;引入可信第三方并设计高效的密钥协议对参与方上传的参数进行加密来确保隐私安全,每个用户能够独立验证服务器返回的聚合结果。安全性分析表明,提出的方案满足不可区分、数据隐私等安全性能;实验结果显示,方案的准确率较高并且通信开销与对比算法相比也有明显优势。 展开更多
关键词 联邦学习 隐私保护 组长选取 梯度选择 可验证聚合
在线阅读 下载PDF
AI幻觉治理视角下用户AIGC验证意愿影响因素研究——基于SEM的实证分析
9
作者 毛太田 许鑫 《江苏科技信息》 2026年第2期115-120,共6页
因生成式人工智能(Generative Artificial Intelligence, GAI)赋能人工智能生成内容(Artificial Intelligence Generated Content, AIGC),AI幻觉的隐蔽性与危害性显著增强。鉴于此,文章针对性提出提升用户AIGC验证意愿的建议,旨在为阻... 因生成式人工智能(Generative Artificial Intelligence, GAI)赋能人工智能生成内容(Artificial Intelligence Generated Content, AIGC),AI幻觉的隐蔽性与危害性显著增强。鉴于此,文章针对性提出提升用户AIGC验证意愿的建议,旨在为阻断AI幻觉传播、保障GAI信息生态健康提供理论与实践支撑。研究结合隐私计算理论、信任理论及计划行为理论,通过实证分析探讨潜在变量对GAI用户AIGC验证意愿的影响及作用机制,并采用偏最小二乘结构方程模型(PLS-SEM)对数据进行检验。PLS-SEM结果证实,行为态度、主观规范、感知收益对AIGC验证意愿具有显著的正向影响。 展开更多
关键词 AI幻觉 AIGC 验证意愿 影响因素
在线阅读 下载PDF
双阶理论视域下储能项目CCER的法律规制困境与完善路径研究
10
作者 孙继文 《储能科学与技术》 北大核心 2026年第2期516-524,共9页
国家核证自愿减排量(CCER)交易机制的重启及其配套制度的加速完善,为储能项目实现其减排价值的经济转化提供了关键路径,也使其面临方法学适配、权属界定等独特的法律挑战。通过引入行政法中的双阶理论作为核心分析框架,将储能CCER的生... 国家核证自愿减排量(CCER)交易机制的重启及其配套制度的加速完善,为储能项目实现其减排价值的经济转化提供了关键路径,也使其面临方法学适配、权属界定等独特的法律挑战。通过引入行政法中的双阶理论作为核心分析框架,将储能CCER的生成与流转过程明确划分为两个阶段:第一阶段是以行政确认与监管为核心的“公法生成阶段”,重点剖析项目方法学适配性、额外性论证以及登记行为的法律性质;第二阶段是以私权为核心的“私法流转阶段”,深入探讨CCER权利属性、作为质押担保权利瑕疵风险。最终,提出应构建分段而治、协同联动的法律规制路径,明确各阶段的法律原则,细化核证与交易规则,以期为我国储能产业的高质量发展和全国统一碳市场的法治化建设提供理论参考与决策支撑。 展开更多
关键词 双阶理论 国家核证自愿减排量 CCER 双碳 储能 法律规制
在线阅读 下载PDF
淤地坝碳汇方法学内容特点及项目开发措施
11
作者 李智广 王海燕 +3 位作者 熊锐 成辉 李蔚 金宇曦 《中国水利》 2026年第4期38-44,共7页
淤地坝具有显著的保土保碳、减蚀减排和增绿增汇等作用,其碳汇项目开发对促进淤地坝工程建设和运行管护、助力黄河流域生态保护与实现“双碳”目标具有重要意义。生态环境部和水利部于2025年11月25日联合发布《温室气体自愿减排项目方... 淤地坝具有显著的保土保碳、减蚀减排和增绿增汇等作用,其碳汇项目开发对促进淤地坝工程建设和运行管护、助力黄河流域生态保护与实现“双碳”目标具有重要意义。生态环境部和水利部于2025年11月25日联合发布《温室气体自愿减排项目方法学淤地坝碳汇(CCER—14—005—V01)》,并自印发之日起施行,标志着淤地坝工程属于主管部门发布的碳汇项目方法学支持领域,淤地坝项目碳汇量可以纳入国家核证自愿减排量交易机制。简要阐述该方法学主要内容,包括:适用条件,项目边界、计入期、碳库和温室气体排放源,项目减排量核算方法,监测方法,项目审定与核查要点等。该方法学着重突出淤地坝碳汇作用机理的支撑性,明确淤地坝工程打捆成立碳汇项目,注重监测方法的可操作性和规范性,强调减排量核查时态与监测的一致性。为促进方法学全面落实,积极推动水土保持碳汇交易,提出应抓紧开展项目规划与设计,及时编制项目开发指导文件,严格把控项目开发、监测和核算质量,切实做好意见反馈与整理分析等措施。 展开更多
关键词 水土保持 淤地坝 碳汇项目方法学 碳汇项目开发 国家核证自愿减排量
在线阅读 下载PDF
Improved key exchange protocol for three-party based on verifier authentication 被引量:4
12
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
在线阅读 下载PDF
The Influence of forest certification on forest product trade 被引量:2
13
作者 郑仰南 蒋敏元 《Journal of Forestry Research》 SCIE CAS CSCD 2002年第4期316-318,338,共3页
Forest certification is considered to be complementary to forest management policies and takes a significant effect on forest product trade. In recent decade, it has been followed with interest and approved by governm... Forest certification is considered to be complementary to forest management policies and takes a significant effect on forest product trade. In recent decade, it has been followed with interest and approved by governments and forestry de-partments in the world. This paper analyzes the influence of forest certification on forest product trade in the world, including the interest in certification in exporting countries and importing countries, trade flow and business competition, and the demands for Certified Forest Products (CFPs) and also discusses the influence of forest certification on forest product trade in China. 展开更多
关键词 Forest Certification Certified Forest Products Forest Product Trade
在线阅读 下载PDF
CHOICE APPROACH OF THE OPTIMAL CERTIFICATION METHOD FOR CERTIFIED REFERENCE MATERIALS 被引量:5
14
作者 靳京民 赵华 +2 位作者 张辉 冯典英 李本涛 《化学分析计量》 CAS 2005年第6期1-3,共3页
将田口方法中代表设计研究或生产工艺研究中功能稳定性的信噪比概念用于标准物质定值方法的研究.为标准物质定值方法的优化提供数据处理模式和选择思路。以锌合金标准物质为例,采用原子吸收光谱法和紫外一可见分光光度法对锌合金标准... 将田口方法中代表设计研究或生产工艺研究中功能稳定性的信噪比概念用于标准物质定值方法的研究.为标准物质定值方法的优化提供数据处理模式和选择思路。以锌合金标准物质为例,采用原子吸收光谱法和紫外一可见分光光度法对锌合金标准物质中的铜元素定值,分别计算这两种方法定值数据的信噪比值,通过比较信噪比值的大小来判断两种分析方法的可靠性和分析体系的稳定性。 展开更多
关键词 信噪比 标准物质 原子吸收光谱 紫外-可见分光光度法 分析化学
在线阅读 下载PDF
CAMRF:基于随机摆渡的跨链身份信息互认机制
15
作者 毛贻欢 付伟 +1 位作者 袁志民 孙志宏 《武汉大学学报(理学版)》 北大核心 2026年第1期21-34,共14页
为了解决不同管理域实体之间身份互认困难的问题,提出一种基于随机摆渡的跨链身份信息互认机制(Cross-block-chain Authenticating Mechanism based on Random Ferrying,CAMRF)。该机制首先通过改进的PageRank算法从普通节点中筛选高信... 为了解决不同管理域实体之间身份互认困难的问题,提出一种基于随机摆渡的跨链身份信息互认机制(Cross-block-chain Authenticating Mechanism based on Random Ferrying,CAMRF)。该机制首先通过改进的PageRank算法从普通节点中筛选高信誉候选摆渡节点;然后基于可验证随机函数(VRF)生成共识随机数,动态选举摆渡节点组作为公证人组;最后,由该组节点转发、签名和认证跨域消息,并采用BLS(Boneh-Lynn-Shacham)轻量级聚合签名技术验证消息的真实性与有效性,克服了传统机制存在的中心化依赖强、安全性低的问题。理论分析和实验表明,CAMRF机制具有高互操作性,能有效提高跨域身份认证的安全性和可靠性,具有一定的理论意义和较高的实用价值。 展开更多
关键词 跨链技术 身份认证 可验证随机函数 BLS签名 聚合签名
原文传递
DNATyper^(TM)21与Verifiler^(TM)Plus试剂盒对常规案件检材检验的比较 被引量:1
16
作者 王剑 马云龙 +4 位作者 余政梁 龚政 高馨玉 杨亮 张丽娜 《刑事技术》 2024年第3期318-322,共5页
本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒... 本文通过比较DNATyper^(TM)21与Verifi ler^(TM)Plus两种STR检测试剂盒对各类案件检材的检验能力,探讨DNATyper^(TM)21试剂盒在常规案件检验中应用的可靠性。取0.03125、0.0625、0.125、0.25、0.5、1.0 ng/μL基因组标准品对两种试剂盒进行灵敏度测试;应用DNATyper^(TM)21与Verifi ler^(TM)Plus试剂盒分别对1056例常规案件检材DNA进行检验;对同一样本等位基因进行一致性比较。结果表明,两种试剂盒均可以成功检测出模板浓度在0.0625 ng/μL以上的标准DNA。在检验的1056例样本中,DNATyper^(TM)21试剂盒共检出881例,检出率为83.4%;Verifi ler^(TM)Plus试剂盒检出892例,检出率为84.5%。统计学结果表明两种试剂盒检出率无统计学差异,且同一样本相同基因座得到的等位基因分型一致。综上,DNATyper^(TM)21试剂盒对各类常规检材具有良好的检验能力,可应用于日常案件检验。 展开更多
关键词 法医物证学 DNATyper^(TM)21试剂盒 Verifi ler^(TM)Plus试剂盒 比较研究 生物检材
在线阅读 下载PDF
铜基仿真饰品中镍释放量标准样品的研制
17
作者 丁志勇 刘崇华 +2 位作者 袁军平 田勇 霍炜强 《广州化工》 2026年第1期106-109,114,共5页
为解决现有镍释放量标准样品基材不符、成本高、均匀性评估不合理等问题,研制适配实际检测需求的标准样品。以高纯无氧铜为主要基材,添加高纯镍经熔炼、退火、轧压等工艺制备样品,参考EN 1811:2011+A1:2015方法测试,采用不均匀性偏差法... 为解决现有镍释放量标准样品基材不符、成本高、均匀性评估不合理等问题,研制适配实际检测需求的标准样品。以高纯无氧铜为主要基材,添加高纯镍经熔炼、退火、轧压等工艺制备样品,参考EN 1811:2011+A1:2015方法测试,采用不均匀性偏差法评估均匀性,趋势分析法检验稳定性,经10家实验室协作定值。结果显示,样品镍释放量标准值为0.50μg/(cm^(2)·week),扩展不确定度0.11μg/(cm^(2)·week),均匀性良好且23个月内稳定性可靠,样品可重复使用。该样品成本低、镍释放量与标准限量匹配,可用于仿真饰品镍释放量测试的质量控制、人员考核及能力验证,对保障检测结果准确性具有重要意义。 展开更多
关键词 仿真首饰 镍释放量 均匀性 稳定性 定值
在线阅读 下载PDF
对基于Bell态的量子指定验证者签名协议的伪造攻击与改进
18
作者 吴健雄 邹祥福 《五邑大学学报(自然科学版)》 2026年第1期1-8,共8页
量子签名是量子密码学的一个重要分支,在信息安全领域具有重要应用价值.为了揭示一个基于Bell态的量子指定验证者签名协议隐藏的安全漏洞,本文通过构造一种针对该签名协议的有效伪造攻击方法,证明了攻击者可以成功伪造任何消息的有效签... 量子签名是量子密码学的一个重要分支,在信息安全领域具有重要应用价值.为了揭示一个基于Bell态的量子指定验证者签名协议隐藏的安全漏洞,本文通过构造一种针对该签名协议的有效伪造攻击方法,证明了攻击者可以成功伪造任何消息的有效签名.这证明了上述签名协议是不安全的.为抵御上述构造的伪造攻击,本文通过替换原协议中的签名酉操作,提出了一个改进的量子指定验证者签名协议.分析表明,改进后的协议既能保持原协议的效率,又能够抵御前面构造的伪造攻击,提升了协议的安全性能. 展开更多
关键词 量子签名 指定验证者 伪造攻击 BELL态
在线阅读 下载PDF
基于可验证凭证的软件定义边界匿名身份认证方案
19
作者 司雪鸽 贾洪勇 +2 位作者 李惟贤 曾俊杰 门蕊蕊 《计算机科学》 北大核心 2026年第1期363-370,共8页
标准软件定义边界(SDP)架构采用基于访问者身份的认证与授权策略,实时监控与审计访问行为。但访问者需完全披露身份信息以获取访问权限,可能泄露与服务无关的敏感数据,从而带来隐私风险。针对当前软件定义边界架构下存在的用户隐私信息... 标准软件定义边界(SDP)架构采用基于访问者身份的认证与授权策略,实时监控与审计访问行为。但访问者需完全披露身份信息以获取访问权限,可能泄露与服务无关的敏感数据,从而带来隐私风险。针对当前软件定义边界架构下存在的用户隐私信息难以得到有效保护、访问记录容易遭受恶意关联等问题,提出一种适用于软件定义边界架构的基于可验证凭证的匿名认证方案。基于双线性映射和CL签名构建可验证凭证的验证算法,并将可验证凭证体系与标准软件定义边界架构相融合,在不改变原有基于单包授权与TLS安全连接认证模式的前提下实现用户匿名访问。理论分析表明,此方案能够抵抗敲门放大攻击、身份仿冒攻击等常见的网络攻击。实验结果表明,此方案在多节点网络环境进行身份认证所产生的时延更短。 展开更多
关键词 软件定义边界 可验证凭证 匿名认证 CL签名 隐私保护
在线阅读 下载PDF
IOTA-Based Authentication for IoT Devices in Satellite Networks
20
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
上一页 1 2 208 下一页 到第
使用帮助 返回顶部