首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 421 毫秒
1.
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.  相似文献   

2.
Based on the Dyson expansion theory, a microscopic approach of sdgIBM-1 is presented and applied to nucleus154Gd in this paper. The energy spectra andE2 transition have been calculated. Good agreement is obtained in comparison with experimental results. Foundation item: Supported by the Foundation of Administration of Education of China Biography: Sang Jian ping (1959), male. Ph. D. Professor, research direction: nuclear physics  相似文献   

3.
According to the frequency property of Phasedarray ground penetrating radar (PGPR), this paper gives a frequency point slice method based on Wigner time-frequency analysis. This method solves the problem of analysis for the PGPR‘s superposition data and makes detecting outcome simpler and detecting target more recognizable. At last, the analytical, results of road test data of the Three Gorges prove the analytical method efficient.  相似文献   

4.
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model has the characters of parallel computing and goal driving. Foundation item: Supported by the National Natural Science Foundation of China( 60205007) , Natural Science Foundation of Guangdong Province(001264), Research Foundation of Software Technology Key Laboratory in Guangdong Province and Research Foundation of State Key Laboratory for Novel Software Technology at Nanjing University Biography: Yin Jian ( 1968-), male, Associate professor, research direction: artificial intelligence, data mining.  相似文献   

5.
In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.  相似文献   

6.
By using an LKB-2277 bioactivity monitor and ampoule method, the fundamental thermogenesis curves of the metabolic process of liver mitochondria fromCarassius auratus hybrid carps and the toxic effect of Na2SeO3 on it were studied at 28°C. From the thermogenesis curves, the thermokinetic equations were established under different condition. The kinetics show that Na2SeO3 has toxic action on the metabolism process ofCarassius auratus hybrid carps liver mitochondria. Foundation item: Supported by the National Science Foundation of China (29973030, 30170010 and 5020310), Chenguang Project of Wuhan and National Postdoctor Foundation of China Biography: Li Xi (1968-), female, Associate pofessor, research direction: biothermochemistry and biomaterials.  相似文献   

7.
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.  相似文献   

8.
Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified elliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (ellipticcurve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security.  相似文献   

9.
We cryptanalyze Kim et al ‘ s onetime proxy signature scheme used in mobile agents, and then a successful forgery is introduced. It is showed that a dishonest customer can successfully forge a va[id onetime proxy signature by impersonating the server. Furthermore, he can request the server with responsibility for the forged bidding information.  相似文献   

10.
A conspiracy attack is proposed to show that Wang-Li‘s scheme is insecure, because any t or more group members can impersonate other t members to sign any message without holding the responsibility. To avoid the conspiracy attack, this paper presents a new (t, n) threshold signature scheme with traceable signers.  相似文献   

11.
Hausdorff Measure of Linear Cantor Set   总被引:2,自引:0,他引:2  
We study the Hausdorff measure of linear Cantor set E,on the unit interval,under the strong seperated condition.We give a necessary and sufficient condition for (E) =|E|^α by using the contracting ratio and the first gap.This condition is easy to use.  相似文献   

12.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

13.
The paper presents the embedded real-time software-oriented requirements engineering environment—SREZ. It involves the whole process of software requirements engineering, including the definition, analysis and checking of requirements ,specifications. We first explain the principles of the executable specification language RTRSM. Subsequently, we introduce the main functions of SREE, illustrate the methods and techniques of checking requirements specifications, especially how to perform simulation execution, combining prototyping method with RTRSM and animated representations. At last, we compare the SREE with other requirements specifications methods and make a summary for SREE's advantages.  相似文献   

14.
Adopting the lifting scheme, introduced by Sweldens, a new wavelet is constructed. It overcomes the shortcoming of the classical wavelets that has no flexibility in the number of vanishing moment. Two examples are given to prove the second-generation wavelets‘s potentialities in the singularity detection of signal: a wavelet with vanishing moment and symmetry can be constructed according to the problem.  相似文献   

15.
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.  相似文献   

16.
This paper discusses a re-examinatlon of dual methods based on Gomory's cutting plane for the solution of the integer programming problem, in which the increment of objection function is allowed as a pivot variable to decide the search direction and stepsize. Meanwhile, we adopt the current equivalent face technique so that lattices are found in the discrete integral face and stronger valid inequalities are acquired easily.  相似文献   

17.
Chinese Postman Problem is an unsettled graphic problem. It was approached seldom by evolutionary computation. Now we use genetic algorithm to solve Chinese Postman Problem in undirected graph and get good results. It could be extended to solve Chinese postman problem in directed graph. We make these efforts for exploring in optimizing the mixed Chinese postman problem. Foundation item: Supported by the National Natural Science Foundation of China (60133010, 70071042) Biography: Jiang Hua(1974-), male, Master candidate, research direction: Evolutionary computation.  相似文献   

18.
19.
We investigated the directed graph self similar sets under some weak overlapping condition. We get the multifractal decomposition formulas for these sets, i. e.,dim Ku^a DimKu^a =f(a), where fis the multifractal spectral function of the directed graph self similar measure. Especially, the results improve that of Edgar and Mauldin to the case which allows certain overlapping.  相似文献   

20.
L r convergence and convergence in probability for weighted sums ofL q-mixingale arrays have been discussed and the Marcinkiewicz type weak law of large numbers forL q-mixingale arrays has been obtained. Foundation item: Supported by the National Natural Science Foundation of China (10071058) Biography: Gan Shi-xin (1939-), male, Professor, research direction; martingale theory, probability limiting theory and Banach space geometry theory.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号