期刊文献+
共找到150篇文章
< 1 2 8 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
2
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
3
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
基于遗传算法的蓄电池轮胎式装载机优化设计
4
作者 饶俊良 陈子林 《科技创新与应用》 2025年第11期120-123,共4页
为了解决防爆蓄电池轮胎式装载机工作装置在传统设计模式下效率低下、准确性不足的缺陷,通过分析防爆装载机工作装置的各部件间的相互关系和运动规律,以及实际工作环境中的多种约束条件,建立工作装置优化设计的数学模型,利用VC++和MATLA... 为了解决防爆蓄电池轮胎式装载机工作装置在传统设计模式下效率低下、准确性不足的缺陷,通过分析防爆装载机工作装置的各部件间的相互关系和运动规律,以及实际工作环境中的多种约束条件,建立工作装置优化设计的数学模型,利用VC++和MATLAB软件编写基于遗传算法的工作装置优化程序;该程序通过模拟自然选择和遗传机制,经过程序在解空间的多次迭代和寻优求解,关键性能指标的优化比原模型提高11.3%,大大提高产品效率,可为同类型的复杂机构优化设计提供参考和借鉴。 展开更多
关键词 遗传算法 优化设计 防爆装载机 工作装置 数学模型
在线阅读 下载PDF
移动边缘计算中的多层区块链网络数据防篡改方法研究
5
作者 叶惠仙 《成都工业学院学报》 2025年第3期44-49,共6页
研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区... 研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区块链组合随机数与网络数据,结合哈希算法与不对称的公钥和私钥,对移动边缘计算中的多层区块链网络数据进行加密,并利用解密方式反向验证数据是否被篡改,阻止危险发生,保障数据私钥泄露后的数据防篡改;中间层中间节点定期将边缘区块链获取的安全数据包发布给中间区块链,并在认证层认证节点作用下完成移动边缘计算数据的安全保护。实验结果说明,所提方法可有效保障移动边缘计算中的多层区块链网络数据安全,避免数据被篡改,同时所提方法应用后数据被篡改次数很低,抗攻击性能强,数据存储无丢失,稳定性好。 展开更多
关键词 区块链 移动边缘计算 防篡改方法 哈希算法 网络数据 私钥加密
在线阅读 下载PDF
基于高效历史工作证明区块链的无人机身份认证方案
6
作者 杜晓玉 张俊杰 +2 位作者 李辉 党兰学 韩志杰 《河南大学学报(自然科学版)》 北大核心 2025年第1期21-31,共11页
当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟... 当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟大等问题.为此提出了一种新型的无人机身份认证方案——基于高效历史工作证明区块链的无人机身份认证方案(EPOH).为提升通讯效率,EPOH方案采用了联盟链作为数据存储中心,并通过统计一段时间内各节点转发交易数量的方法来优化节点选举过程.此外还设置了冷却期来避免单个节点连续多次成为领导者,从而保障了系统的去中心化特性.EPOH方案还通过连续哈希证明技术,通过生成区块内的事件次序证明,消除了时钟同步的需要,从而大幅提高共识达成速度.安全分析部分显示出EPOH方案能够抵御恶意分叉的能力.实验分析部分验证了EPOH方案能够有效提高系统吞吐量,降低交易确认延迟,显著降低资源消耗和交易成本. 展开更多
关键词 无人机身份认证方案 区块链 共识算法 历史工作证明
原文传递
基于记忆策略的元解释学习
7
作者 王榕 田聪 +2 位作者 孙军 于斌 段振华 《软件学报》 北大核心 2025年第8期3477-3493,共17页
元解释学习(meta-interpretive learning,MIL)是一种归纳逻辑程序设计(inductive logic programming,ILP)方法,旨在从一组实例、元规则和其他背景知识中学习一个程序.MIL采用深度优先和失败驱动策略在程序空间中搜索适当的子句以生成程... 元解释学习(meta-interpretive learning,MIL)是一种归纳逻辑程序设计(inductive logic programming,ILP)方法,旨在从一组实例、元规则和其他背景知识中学习一个程序.MIL采用深度优先和失败驱动策略在程序空间中搜索适当的子句以生成程序.事实上,这种机制不可避免地引发了对相同目标重复证明的问题.提出一种剪枝策略,该策略利用Prolog内置的数据库机制来存储未能达成的目标及其对应的错误信息,从而有效避免冗余的证明过程.此后,这些累积的错误信息能够作为指导,帮助MIL系统在未来的学习过程中进行优化和调整.证明剪枝算法的正确性,并在理论上计算程序空间的缩减比例.将所提出的方法应用于两个现有的MIL系统Metagol和Metagol_(AI),从而产生了两个新的MIL系统MetagolF和Metagol_(AI_F).在4个不同任务上的实证结果表明,所提出的策略可以显著减少学习相同程序的时间消耗. 展开更多
关键词 元解释学习 冗余证明 记忆策略 剪枝算法 归纳逻辑程序设计
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
8
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
9
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
EG-DPoS:基于演化博弈的DPoS优化共识算法
10
作者 刘勇 邓小鸿 +2 位作者 刘力汇 石亦燃 张丽 《计算机科学与探索》 北大核心 2025年第5期1379-1394,共16页
针对委托权益证明算法(DPoS)共识过程中,投票节点积极性不高、恶意节点贿赂拉票和代理节点按序出块易被攻击的问题,提出了一种基于演化博弈的DPoS优化共识算法(EG-DPoS)。引入信用机制构建节点投票激励模型,根据节点的投票情况给予信用... 针对委托权益证明算法(DPoS)共识过程中,投票节点积极性不高、恶意节点贿赂拉票和代理节点按序出块易被攻击的问题,提出了一种基于演化博弈的DPoS优化共识算法(EG-DPoS)。引入信用机制构建节点投票激励模型,根据节点的投票情况给予信用值奖励,有效提高了节点的投票积极性;基于演化博弈的策略制定了一种行为奖惩机制,对投票选举阶段各节点的不同行为策略预设对应的收益函数并实施奖惩,以此来遏制恶意节点的贿赂合谋行为,保证了系统的稳定性和公平性;平衡代理节点选举过程中信用值和投票权重的比例系数,以减少高信用值节点造成的寡头现象,同时利用轮盘选择算法打乱代理节点的出块顺序,避免节点在出块过程中被攻击,提高了系统的安全性。仿真实验结果表明,与DPoS算法相比,EG-DPoS的平均时延降低了36.83%,平均吞吐量提高了19.44%,且参与投票的节点数与总节点数的比值提升约42%。这是由于EG-DPoS中存在投票激励机制和设定了固定的投票时间,以及在演化博弈策略的作用下,节点会随系统的运行表现得更加安全高效,使得代理节点的出块效率和共识效率更高,因此能在降低时延的同时提升吞吐量和投票节点的积极性,并且与其他典型DPoS改进算法相比,EGDPoS也具有明显的性能优势。 展开更多
关键词 演化博弈 委托权益证明(DPoS) 共识算法 区块链 信用激励
在线阅读 下载PDF
一种适用于分布式电力交易的安全高效区块链共识算法
11
作者 房永浩 姚中原 +1 位作者 李敏 斯雪明 《计算机工程》 北大核心 2025年第8期250-261,共12页
分布式电力交易成为电力能源交易的未来发展趋势,区块链凭借其技术特性为分布式电力交易中缺乏监管机制、交易成本过高、信息规则不明等问题提供解决思路。然而,随着分布式电力交易规模逐渐增大,区块链系统吞吐量降低,这也间接限制了分... 分布式电力交易成为电力能源交易的未来发展趋势,区块链凭借其技术特性为分布式电力交易中缺乏监管机制、交易成本过高、信息规则不明等问题提供解决思路。然而,随着分布式电力交易规模逐渐增大,区块链系统吞吐量降低,这也间接限制了分布式电力交易的成交速度。为此,提出一种适用于分布式电力交易的高效安全的区块链共识算法。基于分布式电力交易网络内节点的历史交易特性,使用聚类算法将共识网络规划为多共识集双层网络结构,并采用双层共识流程提升共识的并行性。同时,设计高效的单共识集内领导节点选举策略,可以快速确定表现良好、性能较优的领导节点。最后,引入结合零知识证明与密钥分享的认证方法,进一步降低恶意节点参与共识的可能性。实验结果表明,所提共识算法的抗拜占庭节点数量可以抵御双花攻击等多种区块链攻击,能够显著降低共识通信开销与时延,有效提高系统吞吐量。 展开更多
关键词 区块链 分布式能源交易 共识算法 零知识证明 密钥分享
在线阅读 下载PDF
基于改进MD5算法的网页数据防篡改方法
12
作者 张佳发 邹洪 谢娇 《微型电脑应用》 2025年第6期44-48,共5页
由于当前MD5(message digest 5)算法对网页数据的加密过程过于复杂,导致网页数据防篡改效果差。为了有效确保网页数据存储和传输的安全性,提出一种基于改进MD5算法的网页数据防篡改方法。获取网页数据的样本容量梯度和拉格朗日乘数梯度... 由于当前MD5(message digest 5)算法对网页数据的加密过程过于复杂,导致网页数据防篡改效果差。为了有效确保网页数据存储和传输的安全性,提出一种基于改进MD5算法的网页数据防篡改方法。获取网页数据的样本容量梯度和拉格朗日乘数梯度,通过改进MD5算法建立滑动同态混合加密函数,根据编制衍网页数据加密指令。在预设的神经网络中,利用改进MD5算法核定重加密的标准,调整网页数据加密距离,在初始的加密程序内加入深度学习结构,形成双向重叠的缓和加密流程,实现网页数据防篡改。实验结果表明,所提方法可以有效防止网页数据被篡改,同时还可以有效确保数据网页数据的完整性和安全性。 展开更多
关键词 梯度获取 改进的MD5算法 网页数据 防篡改
在线阅读 下载PDF
自动化决策算法中的个人信息侵权因果关系认定
13
作者 姚朱沁 《网络安全与数据治理》 2025年第3期96-102,共7页
自动化决策算法与传统侵权法体系之间存在适用上的矛盾,亟须通过因果关系的认定予以化解。对此,应在坚持传统的因果关系构成要件认定标准基础上,结合比例因果关系理论,对各因素在损害结果中的贡献进行量化分析。针对单一信息处理者场景... 自动化决策算法与传统侵权法体系之间存在适用上的矛盾,亟须通过因果关系的认定予以化解。对此,应在坚持传统的因果关系构成要件认定标准基础上,结合比例因果关系理论,对各因素在损害结果中的贡献进行量化分析。针对单一信息处理者场景,可以在疑难案件中引入“合理盖然性”标准降低受害人举证难度;对于多主体参与的情形,通过类推适用共同危险行为制度实现举证责任倒置,但需以整体行为与损害的因果关系证成为前提。此法律框架有助于在多方数据处理和信息流转背景下,更有效地解决技术复杂性带来的法律挑战,推动信息保护与技术发展的平衡。 展开更多
关键词 因果关系 算法侵权 相当性 证明责任分配 共同危险行为
在线阅读 下载PDF
大数据技术背景下司法证明的认知结构与限度
14
作者 刘梓淞 《湖北警官学院学报》 2025年第5期134-147,共14页
长久以来,司法证明的认知结构这一论题并未获得证据法学界的重视,司法证明的研究场域被局限在法律形式主义的司法三段论中,但事实上,传统的司法证明具备“经验—逻辑—结论”的三重认知结构。大数据技术介入司法证明领域后,司法数据库... 长久以来,司法证明的认知结构这一论题并未获得证据法学界的重视,司法证明的研究场域被局限在法律形式主义的司法三段论中,但事实上,传统的司法证明具备“经验—逻辑—结论”的三重认知结构。大数据技术介入司法证明领域后,司法数据库的建立、算法模型及其生成规律的适用为司法证明的认知结构带来了要素性的转变,同时也在证明逻辑层面揭示了法官作为“逻辑黑箱”与“算法黑箱”存在一定程度的同质性。大数据司法证明具有“数据库—逻辑—结论”的认知结构,其以法官的有限理性为限,并以消解认知上的不透明性为目的。在当前大数据证明的认知结构下,大数据技术的信息收集与处理能力决定了司法证明的技术限度;大数据用于智能增强的技术定位决定了司法证明的伦理限度;大数据技术原理下司法证明的工作方式决定了司法证明的事实限度。 展开更多
关键词 大数据 司法证明 认知结构 算法黑箱 法律现实主义 法律形式主义
在线阅读 下载PDF
Membership Proof and Verification in Authenticated Skip Lists Based on Heap 被引量:1
15
作者 Shuanghe Peng Zhige Chen Deen Chen 《China Communications》 SCIE CSCD 2016年第6期195-204,共10页
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ... How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees. 展开更多
关键词 authenticated skip list max heap membership proof STACK algorithms
在线阅读 下载PDF
Philosophical Study of Scientific Proof
16
作者 Bondarenko Stanislav Borisovich 《Journal of Philosophy Study》 2015年第1期24-28,共5页
The scientific proof is the highest type of the rational proof. The mankind is looking for the best technology of the reasonable demonstration. What is a proof?. What is a scientific proof?. Philosophical investigat... The scientific proof is the highest type of the rational proof. The mankind is looking for the best technology of the reasonable demonstration. What is a proof?. What is a scientific proof?. Philosophical investigations of proofs have the long history. Philosophy is exploring physics, mathematics, astronomy, biology, history, and so on. Science demands strict proofs. Science uses the specific methods as the optimum technologies for the achievement of the truth. Strictness of the proof depends on the aim algorithm: the distribution of the functions between parts of the proof. The beginning stage, the middle parts, and the ending stage are the unit of the proof. Philosophy can make the correct model of the scientific proof only! Science and its methodology develop and the growth of knowledge has not the finish. The rational ideals improve continually. Science is looking for the criterion of the demonstrative strictness. The adaptation algorithm of the scientific method is the best technology for the achievement of the truth. 展开更多
关键词 SCIENCE proof model method UNIT algorithm
在线阅读 下载PDF
网络犯罪数额证明难题及其应对 被引量:8
17
作者 张迪 《现代法学》 CSSCI 北大核心 2024年第5期162-176,共15页
我国网络犯罪数额的证明难题虽然实践样态各异,但可划分为证据短缺型与海量证据型两种。产生这些证明难题的深层原因在于,传统犯罪网络化加大了犯罪数额的证明难度,法律规范对证明对象、证明机制与证据种类的特殊设定内在地限制了司法... 我国网络犯罪数额的证明难题虽然实践样态各异,但可划分为证据短缺型与海量证据型两种。产生这些证明难题的深层原因在于,传统犯罪网络化加大了犯罪数额的证明难度,法律规范对证明对象、证明机制与证据种类的特殊设定内在地限制了司法人员的证明活动。有关部门通过出台司法解释和规范性文件来拓展定罪量刑要素、设置综合认定、确立推定规则及设立抽样验证等,以期解决网络犯罪数额证明难题。这种应激性的应对方式可能侵蚀法律规范的有效性,同时也存在实效性较低等问题。解决网络犯罪数额证明难题需检讨既有网络犯罪数额难题治理的底层逻辑。我们应确立网络犯罪数额证明难题双层次应对方案。第一层次方案主要从证明机理入手,优化犯罪数额的证明机制,明确算法证据的独立地位与运用规则。在第一层次方案无法解决特定犯罪数额证明难题的情形下,可采取第二层次的特殊应对方案,主要包括调整定罪量刑要素中犯罪数额的种类与比例,谨慎设置推定规则并限制其运用。 展开更多
关键词 犯罪数额 网络犯罪 证明难题 算法证据 证明标准
在线阅读 下载PDF
基于改进T分布烟花-粒子群算法的AUV全局路径规划 被引量:1
18
作者 刘志华 张冉 +2 位作者 郝梦男 安凯晨 陈嘉兴 《电子学报》 EI CAS CSCD 北大核心 2024年第9期3123-3134,共12页
针对传统粒子群算法在处理自主水下机器人(Autonomous Underwater Vehicle,AUV)全局路径规划时面临的寻优时间长、能耗高的问题,本文提出一种改进的T分布烟花-粒子群算法(T-distribution Fireworks-Particle Swarm Optimization Algorit... 针对传统粒子群算法在处理自主水下机器人(Autonomous Underwater Vehicle,AUV)全局路径规划时面临的寻优时间长、能耗高的问题,本文提出一种改进的T分布烟花-粒子群算法(T-distribution Fireworks-Particle Swarm Optimization Algorithm,TFWA-PSO),该算法融合了烟花算法的高效全局搜索能力和粒子群算法的快速局部寻优特性.在变异阶段,提出自适应T分布变异来扩大搜索范围,并在理论上证明了该变异方式能够使个体在局部最优解附近增强搜索能力.在选择阶段提出了适应度选择策略,淘汰适应度差的个体,解决了传统烟花算法易丢失优秀个体的问题,并对改进的T分布烟花算法与传统烟花算法的收敛速度进行对比.将改进算法的爆炸操作、变异操作和选择策略融合到粒子群算法中,对粒子群算法的速度更新公式进行了改进,同时从理论上对所改进的算法进行了收敛性证明.仿真实验结果表明,TFWA-PSO能够有效规划出一条最短路径,同时与给定的智能优化算法相比,TFWA-PSO在寻找最优路径的时间上平均降低了24.72%,能耗平均降低了17.33%,路径长度平均降低了16.96%. 展开更多
关键词 自主水下机器人 全局路径规划 烟花算法 粒子群算法 自适应T分布变异 收敛性证明
在线阅读 下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles 被引量:1
19
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部