首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protocol is executed successfully. Then both can deny their transmitted messages protected by the authenticated session key. If this protocol fails, no authenticated session key can be established and no protected messages can be transmitted. The protocol can be proved secure against key compromise impersonation attack. The protocol employs a new method to isolate a session key from confirmation keys.  相似文献   

2.
比比谁会赢     
根据提示,完成下面的填字游戏吧,比一比看谁填得多。DOWN 1.a brown sweet soft drink 2.young dog ACROSS 3.a set of printed pages is held together,you can read them 4.you can use it to record sounds 5.when we can’t find a place, we can use it  相似文献   

3.
Resources are the base and core of education information, but current web education resources have no structure and it is still difficult to reuse them and make them can be self assembled and developed continually. According to the knowledge structure of course and text, the relation among knowledge points, knowledge units from three levels of media material, we can build education resource components, and build TKCM (Teaching Knowledge Combination Model) based on resource components. Builders can build and assemble knowledge system structure and make knowledge units can be self assembled, thus we can develop and consummate them continually. Users can make knowledge units can be self assembled and renewed, and build education knowledge system to satisfy users' demand under the form of education knowledge system.  相似文献   

4.
A tubular focused sonochemistry reactor   总被引:1,自引:0,他引:1  
This paper presents a new sonochemistry reactor, which consists of a cylindrical tube with a certain length and piezoelectric transducers at tube’s end with the longitudinal vibration. The tube can effectively transform the longitudinal vibration into the radial vibration and thereby generates ultrasound. Furthermore, ultrasound can be focused to form high-intensity ultrasonic field inside tube. The reactor boasts of simple structure and its whole vessel wall can radiate ultrasound so that the electroacoustic transfer efficiency is high. The focused ultrasonic field provides good condition for sonochemical reaction. The length of the reactor can be up to 2 meters, and liquids can pass through it continuously, so it can be widely applied in liquid processing such as sonochemistry.  相似文献   

5.
Mesenchymal stem cells (MSCs) are multipotent cells, which can differentiate into different tissues. It is still controversial whether MSCs can be isolated from adult peripheral blood (PB) under normal conditions and whether they can be mobilized in a way similar to that of hematopoieUc stem cells (HSCs). In this study, rat MSCs circulating in the PB under normal conditions can be isolated and cultured, and MSCs from PB and BM can be mobilized by LiCL. The mobilized MSCs can be induced to differentiate into neuron by such factors as β-mercaptoethanol and supernatants of nerve cell cultures. The present study provides a broader perspective on the repair of neural trauma.  相似文献   

6.
QRF Burner can control the ratio of the oil and air autmotically by follow the change of fuel oil pressure. The temperature of the preheated air can be up to 550℃, since steam is adopted as heat insulation material. So it can sa-  相似文献   

7.
A new fair e-eash payment scheme based on credit is present in this paper. In the scheme, an overdraft credit certificate is issued to user by hank. Using the overdraft credit certificate, user can produce e-cash himself to pay in exchanges. Merchant can verify the e-cash received from user. Bank can make a fair dis pute resolution when there is a dissension between user and merchant. It can avoid 'the problem of partition e-cash for changes, prevent from reusing e-cash and fa- king e-cash, It. fits justice, anonymity, non deny and impartiality.  相似文献   

8.
The analysis of fabrics of different woven constructions made of the same count of yarn indicates different wrinkle recovery and other mechanical properties before and after wrinkle resistant treatment. For the plain weave fabrics, parameters of the warp threads and weft threads can influence the effect of wrinkle resistance finishing. When the parameters of warp threads are similar as that of the weft threads, the even - structure can be obtained . Therefore, the best wrinkle recovery angle can be obtained. With the increasing of warp threads and weft threads, the strength of non - finished and finished fabrics can be increased. When the warp threads are similar as the weft threads, high strength retain can also be obtained.  相似文献   

9.
The multi-stage humidifier semi-dry flue gas cleaning technology, the CRS plasma flue gas cleaning technology and oxidative additive flue gas cleaning technology were investigated for multi-pollutants removal. The semi-dry flue gas cleaning technology using multistage humidifier and additive can improve oxidation and absorption, and it can achieve high multi-pollutants removal efficiency. The CRS discharge can produce many OH radicals that promote NO oxidation. Combining NaOH absorption can achieve high deSO2 and deNOx efficiencies. It is very fit of the reconstruction of primary wet flue gas desulfurization (WFGD). In addition, Using NaClO2 as additive in the absorbent of WFGD can obtain very high removal efficiency of SO2 and NOx.  相似文献   

10.
There are many karst areas within WuGuang route; karst grouting is one of the main construction procedures of the sub-grade construction. Construction principles can be determined through construction art tests. Water and cementation ratio can be determined and then different grouting quantity and pressure can be determined according to different geology condition; grouting construction key points and quality check requirements can also be determined. Recommendations for quality problems such as bad practicability of grouting, unexpected dissipation of slurry, slurry belching, and overfeeding of slurry going to non-grouting area have been proposed in the paper.  相似文献   

11.
The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets.  相似文献   

12.
Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's scheme also can not provide forward secrecy and confidentiality such that any adversary can easily recover the transferred message. Based on intractability of reversing the one-way hash function and discrete logarithm problem, an improved authenticated encryption scheme with messages linkage is proposed. The above security faults get solved perfectly. The new scheme is proven to satisfy all the basic security requirements of the authenticated encryption scheme. And by the concrete comparison, it has the similar efficiency of the original scheme.  相似文献   

13.
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm.  相似文献   

14.
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di…  相似文献   

15.
Several public-key encryption schemes used to solve the problem of ciphertext data processing on the fly are discussed. A new targeted fully homomorphic encryption scheme based on the discrete logarithm problem is presented. Public-key encryption cryptosystems are classified to examine homomorphic encryption. Without employing techniques proposed by Gentry such as somewhat homomorphic and bootstrapping techniques, or relinearization technique proposed by Brakerski et al., a new method called "Double Decryption Algorithm" is employed in our cryptography to satisfy a fully or targeted fully homomorphic property. Inspired by EIGamal and BGN cryptography, we obtain the desired fully homomorphic property by selecting a new group and adding an extra component to the ciphertext. Proof of semantic security is also demonstrated.  相似文献   

16.
This paper introduces an RTP-packets‘ loss recovery scheme in MPEG-4 playback type multicast application model, which is based on retransmission scheme. Through the auxiliary and coordinated buffer playing scheme of layered “buffer-routers”, the RTP-packets‘ loss recovery in limited time is made possible. We consider in the scheme to handle retransmission request with buffer waiting when network congestion occurs. Thus, neither the degree of congestion will be worsened nor the retransmission request will be lost when sending the request to higherlevel buffer router. The RTP-packets‘ loss recovery scheme suggested by us is not only applied to MPEG-4 muhieast application in LAN, but also can be extended to more spacious WAN (wide area network) when user groups comparatively centralize in certain number of local areas.  相似文献   

17.
围绕多关键字的高效密文搜索和数据安全性保障问题,展开分析与研究,基于同态加密和私有集合交集技术,提出一种面向多关键字的高效的保护搜索模式的可搜索加密方案.该方案使用随机数填充和Paillier同态加密方法构造安全索引和陷门,保护了索引隐私和陷门隐私,进而保护了搜索模式;该方案通过私有集合交集技术进行连接多关键字搜索,搜索中只使用到了乘法和指数运算,与其他方案相比大大提高了效率;安全性和性能分析表明,该方案具有可搜索加密的语义安全性,可以高效地实现对密文的多关键字搜索,且具有良好的计算代价.  相似文献   

18.
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA and develop this idea from two-party to multi-party, and combine this multi-party public key idea with the multiplication in ring R of NTRU. What we get from this design is extremely efficient encryption and decryption, fast and easy key creation, low memory requirements and revocation property, etc. Moreover, this novel work contains other desirable features, such as traitor tracing. With its complexity only O(log2 n), the tracing algorithm of this system is more efficient than that of the previous ones.  相似文献   

19.
Adopting the lifting scheme, introduced by Sweldens, a new wavelet is constructed. It overcomes the shortcoming of the classical wavelets that has no flexibility in the number of vanishing moment. Two examples are given to prove the second-generation wavelets‘s potentialities in the singularity detection of signal: a wavelet with vanishing moment and symmetry can be constructed according to the problem.  相似文献   

20.
A watermarking algorithm of binary images using adaptable matrix is presented. An adaptable matrix is designed to evaluate the smoothness and the connectivity of binary images. The watermark is embedded according to the adaptable matrix in this algorithm. In the proposed watermarking algorithm, each image block implements a XOR operation with the binary adaptable matrix, which has the same size with the image block, and in order to embed the watermark data, a multiplication operation are also implemented with the weight matrix. The experimental results show that proposed scheme has a good performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号