首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
安全多方计算(SMC,Secure Multi-Party Computation)是研究一组互不信任的参与方之间保护私有信息的合作计算问题.保护隐私计算几何问题是一类特殊的安全多方计算问题.分析研究了计算几何中最近点对问题,在半诚实模型下基于不经意传输协议设计了一个保留隐私的计算最近点对协议,并对该协议的正确性和安全性进行了证明和复杂性分析.该方案与同类方案相比无需茫然第三方参与,不需要复杂的加密就达到隐藏数据目的,实现了隐私的保护.  相似文献   

2.
多方安全计算在保密路径判定中的应用   总被引:1,自引:0,他引:1  
保密路径判定是一种特殊的保密隐私的几何计算问题.基于保密点积协议和百万富翁协议提出了一种半诚实模型下的曲线与椭圆区域的保密相交判定协议,并对协议的性能进行了分析.该判定协议可用于解决保密路径判定问题.  相似文献   

3.
普适计算的隐私保护安全协议   总被引:1,自引:0,他引:1  
提出了一个用户隐私保护的安全协议.该协议由服务发现者对用户进行认证和盲签名,随后用户以匿名的方式访问服务提供者提供的资源.根据匿名与不可关联性具有紧密的关系,设计了普适计算的匿名攻击模型,通过匿名攻击模型分析可以看出:隐私保护安全协议不仅允许服务提供者对用户的认证,同时也可以保护用户隐私,并且能够防止重放攻击以及设备间的恶意串通.  相似文献   

4.
不可联系性度量是评价自组织网隐私保护机制的基础。该文着眼于综合评价自组织匿名路由协议对路径上节点间不可联系性的保护程度,在路径不可联系性定义和离散时间模型基础上,利用证据理论提出了一种路径不可联系性度量模型。理论分析和实验表明:相比已有的自组织网不可联系性度量方法,该模型提出适应自组织匿名路由协议特点的证据收集机制,较好地处理了节点移动性和路径长度对路径不可联系性度量的影响,能综合度量自组织匿名路由协议的隐私保护性能。  相似文献   

5.
隐私保护是当前数据挖掘领域中一个十分重要的研究方向,其目的是要在不精确访问真实原始数据的条件下,得到准确的模型和分析结果.为了提高对隐私数据的保护程度和挖掘结果的准确性,研究了一种基于向量点积的分布式关联规则挖掘算法.此算法在分布式环境下,利用保持隐私数据挖掘的基本方法和安全两方计算协议,可以在不泄露任何隐私的基础上有效地对垂直型数据分布进行挖掘.  相似文献   

6.
在无线传感器网络源位置隐私保护问题中,针对具有局部流量分析行为的逐跳反向攻击者,提出了基于随机角度和概率转发的源位置隐私保护路由协议RAPFPR。该协议主要分为两个阶段:真实源节点根据随机角度和距离的有向路由阶段,幻影节点到基站的概率转发路由阶段。协议产生的幻影节点能够很好地均匀分布在真实源节点周围,且采取概率转发路由大大减少了重合路径的产生,增加了逐跳反向攻击的难度。仿真结果表明,与现有的隐私保护方案相比,该路由协议能够在不显著增加通信开销的前提下,有效延长网络的平均安全时间,具有很好的隐私保护性能。  相似文献   

7.
提出了一种适用于网格环境下的隐私保护计算模型.针对当前网格安全研究中对数据隐私性保护的不足,将GSI(网格安全基础件)与同态加密技术、安全点积协议以及数据扰乱算法等多种安全技术相结合,实现在一个互不信任的网格环境中,对各参与节点隐私性数据进行保护,成功避免了传统的隐私保护计算中繁琐的一对多(多对多)的交互式加密,当节点动态变化时,恢复计算仅涉及到构成隐私保护模块的三个节点.安全及动态性分析结果表明:该模型及相关应用算法既提供了数据的隐私性保护,又能良好地适应节点数目众多和动态变化频繁的网格环境.同时给出了基于G2PC模型的具体隐私保护算法--网格环境下的隐私保护方差计算.  相似文献   

8.
针对分布式数据共享及计算中的隐私保护问题,提出了一种适用于大规模分布式环境的隐私保护计算模型(PPCMLS),该模型的核心为隐私安全模块,其将计算划分为本地计算和全局计算.通过综合运用同态加密、安全点积协议、数据随机扰乱算法等多种安全技术,在实现了多个节点在一个互不信任的分布式环境下合作计算的同时,任何节点无法获取其他节点的隐私信息及敏感中间计算结果.据此,又给出了基于该模型的分布式隐私保护方差计算、分布式隐私保护数据聚类算法.安全及动态性分析结果表明,该模型及其应用算法既可保证隐私数据的安全性,又避免了繁琐的一对多的交互加密过程,并在节点变化时,恢复计算仅涉及到变化的节点和构成隐私安全模块的3个节点,从而满足了大规模分布式环境所要求的高效性和良好的动态适应性.  相似文献   

9.
近年来,随着无线传感器网络在军事和医疗等领域的应用越来越多,无线传感器网络的隐私保护研究受到了人们的广泛关注.本文提出了一种门限路由的源节点位置隐私保护协议(Threshold Routing for Source-Location Privacy Protection,TR),与已存在的源位置隐私保护协议不同,该协议可以提供更高效的隐私保护能力和有效地降低能量的消耗.应用NS2进行模拟仿真实验,结果表明与其他的隐私保护协议相比,门限路由协议在能耗和隐私保护方面具有更好的性能.  相似文献   

10.
针对垂直划分多决策表,利用半可信第三方和交换加密体制,设计了一个安全多方计算交集基数协议。利用该协议设计了安全多方计算信息熵和安全多方计算条件信息熵的解决方案,提出了一种基于条件信息熵的隐私保护属性约简算法。该算法基于粗糙集信息观的约简理论实现了分布式环境下全局属性约简的求解,使各参与方在不共享其隐私信息的前提下达到集中式属性约简的效果,分析结果表明该算法是有效可行的。  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
The discovery of the prolific Ordovician Red River reservoirs in 1995 in southeastern Saskatchewan was the catalyst for extensive exploration activity which resulted in the discovery of more than 15 new Red River pools. The best yields of Red River production to date have been from dolomite reservoirs. Understanding the processes of dolomitization is, therefore, crucial for the prediction of the connectivity, spatial distribution and heterogeneity of dolomite reservoirs.The Red River reservoirs in the Midale area consist of 3~4 thin dolomitized zones, with a total thickness of about 20 m, which occur at the top of the Yeoman Formation. Two types of replacement dolomite were recognized in the Red River reservoir: dolomitized burrow infills and dolomitized host matrix. The spatial distribution of dolomite suggests that burrowing organisms played an important role in facilitating the fluid flow in the backfilled sediments. This resulted in penecontemporaneous dolomitization of burrow infills by normal seawater. The dolomite in the host matrix is interpreted as having occurred at shallow burial by evaporitic seawater during precipitation of Lake Almar anhydrite that immediately overlies the Yeoman Formation. However, the low δ18O values of dolomited burrow infills (-5.9‰~ -7.8‰, PDB) and matrix dolomites (-6.6‰~ -8.1‰, avg. -7.4‰ PDB) compared to the estimated values for the late Ordovician marine dolomite could be attributed to modification and alteration of dolomite at higher temperatures during deeper burial, which could also be responsible for its 87Sr/86Sr ratios (0.7084~0.7088) that are higher than suggested for the late Ordovician seawaters (0.7078~0.7080). The trace amounts of saddle dolomite cement in the Red River carbonates are probably related to "cannibalization" of earlier replacement dolomite during the chemical compaction.  相似文献   

14.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

15.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

16.
AcomputergeneratorforrandomlylayeredstructuresYUJia shun1,2,HEZhen hua2(1.TheInstituteofGeologicalandNuclearSciences,NewZealand;2.StateKeyLaboratoryofOilandGasReservoirGeologyandExploitation,ChengduUniversityofTechnology,China)Abstract:Analgorithmisintrod…  相似文献   

17.
There are numerous geometric objects stored in the spatial databases. An importance function in a spatial database is that users can browse the geometric objects as a map efficiently. Thus the spatial database should display the geometric objects users concern about swiftly onto the display window. This process includes two operations:retrieve data from database and then draw them onto screen. Accordingly, to improve the efficiency, we should try to reduce time of both retrieving object and displaying them. The former can be achieved with the aid of spatial index such as R-tree, the latter require to simplify the objects. Simplification means that objects are shown with sufficient but not with unnecessary detail which depend on the scale of browse. So the major problem is how to retrieve data at different detail level efficiently. This paper introduces the implementation of a multi-scale index in the spatial database SISP (Spatial Information Shared Platform) which is generalized from R-tree. The difference between the generalization and the R-tree lies on two facets: One is that every node and geometric object in the generalization is assigned with a importance value which denote the importance of them, and every vertex in the objects are assigned with a importance value,too. The importance value can be use to decide which data should be retrieve from disk in a query. The other difference is that geometric objects in the generalization are divided into one or more sub-blocks, and vertexes are total ordered by their importance value. With the help of the generalized R-tree, one can easily retrieve data at different detail levels.Some experiments are performed on real-life data to evaluate the performance of solutions that separately use normal spatial index and multi-scale spatial index. The results show that the solution using multi-scale index in SISP is satisfying.  相似文献   

18.
In the 19th century the society was controlled by men, and women were just appendants of them, they had not any rights and freedom. But Jane was an exception, she showed some characteristics of early feminist. Jane showed her characteristics of feminism in three aspects: rebellion, equality, and independence. These characteristics were helpful to her success, and feminism is the only way out for women of that time.  相似文献   

19.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

20.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号