排序方式: 共有36条查询结果,搜索用时 0 毫秒
31.
基于OpenSSL的SSL协议实现研究 总被引:1,自引:0,他引:1
一、SSL(安全套接字层)协议概述随着网络及其各种信息服务的迅猛发展,引发了诸多的安全威胁,并且造成了巨大的损失。因此,为通信提供更强大的安全性已成为必需之举。通信安全的中心内容就是保证信息在信道内的保密性、消息完整性和可认证性。 相似文献
32.
Another ID-Based Proxy Signature Scheme and Its Extension 总被引:1,自引:0,他引:1
ZHANG Jianhong ZOU Wei 《武汉大学学报:自然科学英文版》2007,12(1):33-36
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring. 相似文献
33.
为提高4项加权分数阶傅里叶变换(WFRFT)的安全性能,提出了一种基于跳频的改进加权分数阶傅里叶变换.通过子载波跳频的方法打乱传统WFRFT中离散傅里叶变换(DFT)矩阵列的顺序,从而使加权傅里叶变换矩阵的周期以及加权系数的周期在跳频序列的影响下呈现多样性,提高其抗截获的性能.仿真结果表明:改进后的FH-WFRFT能够在参数信息被窃听方获取的情况下保护传输信息的安全,相比传统的WFRFT具有更好的抗截获性能. 相似文献
34.
研究了树状和链树状两种结构的组密钥更新算法的性能优势,提出了链树状结构和树状结构结合使用的组密钥管理方法,并利用转换算法解决了链树状结构向树状结构转换的问题.通过分析证明,新算法比单独使用树状结构或链树状结构的算法效率都高. 相似文献
35.
陈明杰 《现代科技译丛(哈尔滨)》2004,(1):25-25
密码分析学家声称,曾经保护数字通(GSM)电话用户免受即时监听和欺骗的加密,现在已经不再那么坚不可摧了。 相似文献
36.
WEI Yongzhuang HU Yupu . Key Laboratory of Computer Networks Information Security Ministry of Education Xidian University Xi’an Shaanxi China . Guilin University of Electronic Technology Guilin Guangxi China 《武汉大学学报:自然科学英文版》2007,12(1):37-40
0 Introduction Substitution and permutation network (SPN) structure is one of the most widely used structures in block ciphers. The SPN structure is based on Shannon’s principles of confusion and diffusion[1] and these principles are implemented through … 相似文献