首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
周明快 《应用声学》2015,23(1):297-299, 303
针对云计算存储中心由于数据和访问控制的安全性无法得到有效保障,从而可能造成用户存储的敏感数据被盗取的问题,现有的解决方法往往通过加密数据密钥,并通过对数据加密来解决安全性问题,但这些方法没有对访问控制的整个过程进行全面的定义和描述,同时仍然具有较大的时空开销。为此,在对CP-ABE(eiphertext-policy attribute-based encryption)进行深入分析的基础上提出了一种基于改进属性加密访问控制模型,然后对CP-ABE进行改进,并对公钥和主密钥的生成、数据所有者加密文件、访问用户解密文件以及用户权限的全面管理过程均进行了详尽的定义和描述,从而设计了一种通用的安全访问机制。在仿真工具Ubuntu中进行实验,结果表明文中方法能有效地实现云计算环境下的安全访问控制,与其它方法相比,具有计算和存储开销低优点,具有较大的优越性。  相似文献   

2.
可信计算模式下P2P匿名通信系统设计   总被引:1,自引:0,他引:1  
雷涛 《应用声学》2017,25(8):268-271
为了提高P2P匿名通信系统的安全性与可信性,需要对P2P匿名通信系统进行设计。当前使用的匿名通信系统,无法在用户节点匿名的情况下,保证P2P匿名通信系统匿名节点的可信性。因此,提出一种基于可信计算模式的P2P匿名通信系统设计方法。该系统的硬件部分分为系统登录模块、通信模块、数据模块、可信计算模块4大模块,模块之间相互合作,形成一个完整的匿名通信系统,匿名通信系统软件设计部分通过建立可信计算的联接,实现在匿名通道中进行数据传递,并对待传递的数据进行层次性打包加密,同时采用可信度计算对匿名通信系统中节点、匿名通道进行计算,形成安全可信的匿名传递通道。实验仿真证明,该方法在保证该系统数据传递的效率的同时提高了匿名通信系统的安全性与可靠性。  相似文献   

3.
远程认证协议能有效的保证远程用户和服务器在公共网络上的通信安全。提出一种匿名的安全身份认证方案,通过登录 的动态变化,提供用户登录的匿名性,通过用户和服务器相互验证建立共享的会话密钥,抵抗重放攻击和中间人攻击,实现用户安全和隐私,通过BAN逻辑分析证明改进方案的有效性,通过安全性证明和性能分析说明了新协议比同类型的方案具有更高的安全性、高效性。  相似文献   

4.
信息安全是信息化社会国家安全的基石与命脉,而匿名量子通信是保护信息安全的重要通信方式之一.利用量子漫步随机性有效解决身份信息泄露等敏感问题,本文提出一种基于Cayley图上量子漫步的匿名通信方案.首先,通信双方隐藏自身身份信息,发送方Alice通过逻辑或操作匿名选择接收方Bob.其次,可信第三方与通信双方利用BB84协议生成和分发安全密钥, Alice根据安全密钥对信息序列进行加密,获得盲化信息; Bob利用联合Bell态测量和安全密钥进行签名,可信第三方验证签名信息.再次,可信第三方依据傅里叶变换计算Bob量子漫步的位置概率分布函数,将概率最大值对应的位置信息转换为确认帧发送给Alice;Alice利用量子降维压缩算法减少传输信息比特数,并利用安全密钥完成信息加密后将信息传输至确认帧表示的位置, Bob利用量子漫步搜索位置节点获取传输信息,完成匿名量子通信.最后,对方案进行安全分析,并给出200个节点Cayley图的数值仿真结果,漫步10步时,第6个节点的概率最大为45.31%.根据仿真结果,本方案通信过程中Bob漫步10步时被窃听到具体位置的概率近似为6×10~(–7)%.  相似文献   

5.
一种基于授权信道特性的认知无线电频谱检测算法   总被引:2,自引:0,他引:2       下载免费PDF全文
刘允  彭启琮  邵怀宗  彭启航  王玲 《物理学报》2013,62(7):78406-078406
针对认知无线电系统中频谱检测的频率直接影响系统容量以及与授权用户产生冲突的概率问题,分析了授权用户频谱使用的特性, 对授权用户行为进行统计建模, 提出一种自适应频谱检测算法. 引入控制因子, 在保证认知无线电系统稳定性的约束下, 自适应调整频谱感知的频率从而提高频谱利用率并减小系统冲突概率和检测开销, 进而降低了系统的能量消耗. 仿真结果表明, 该算法在保证不对授权用户产生干扰和一定的系统稳定性条件下, 有效地提高了系统的容量,并且具有良好的实用性和灵活性. 关键词: 认知无线电 自适应频谱检测 绿色通信 最大似然  相似文献   

6.
李自清 《应用声学》2017,25(5):184-187, 191
在互联网飞速发展的今天,Web 技术与数据库技术的结合越来越紧密,所以保护数据库的安全成为了信息安全十分重要的一环。在网络环境下,应采用什么样的机制来为用户提供对数据的产生、存储和访问,以及如何有效地保证其中的数据安全性,就成为迫切需要研究的课题。加密技术对数据库中存储的高度敏感机密性数据,起着越来越重要的作用,是防止数据库中的数据在存储和传输中失密的有效手段,所以完全可以用于模型。为了保护互联网中的敏感数据,提出了数据库中敏感数据的加密模型,基于对数据库敏感数据的分析、数据分类,通过加密引擎、密钥管理、失效密钥处理,将用户敏感数据形成密文存储在数据库之中。这样即使是数据库管理员也无法轻易获取用户敏感信息,在因为攻击等问题造成的数据泄露之后也可以减少系统损失,最大限度保证数据库中数据的安全性。实验结果表明该模型可以有效保护数据库中敏感数据安全。  相似文献   

7.
分组密码是一类广泛使用的加密方法.在网络数据加密体系中,为提高信息的安全性,需要保证初始密钥具有足够大的密钥空间.为克服量子计算机对短密钥的威胁,一种基于混沌映射的新型密钥扩展算法被提出.该算法将混沌映射融入到原SM4密钥扩展算法中,有效增大了密钥空间,提高了破译难度.  相似文献   

8.
网络信息安全中DES数据加密技术研究   总被引:1,自引:0,他引:1  
赵彩  丁凰 《应用声学》2017,25(8):49-49
网络信息安全关系到数据存储安全和数据通信安全,为了提高网络信息安全管理能力,需要进行数据优化加密设计,提出一种基于前向纠错编码的DES数据公钥加密技术,采用Gram-Schmidt正交化向量量化方法构建DES数据的Turbo码模型,通过三次重传机制产生密文序列,对密文序列进行前向纠错编码设计,结合差分演化方法进行频数检验,实现网络信息安全中DES数据加密密钥构造,选择二进制编码的公钥加密方案有效抵抗密文攻击。仿真结果表明,采用该加密技术进行DES数据加密的抗攻击能力较强,密钥置乱性较好,具有很高的安全性和可行性。  相似文献   

9.
李雪佳  封红旗  梅宇  赵玉宁 《应用声学》2016,24(5):199-201, 206
移动互联网技术的快速发展,现有的APP提供了非常人性化的操作,用户可以进行对商家的筛选,APP默认的选项“智能排序”,“离我最近”。这两个选择项,系统都会去计算当前用户的位置和各个商家之间的距离。这种大量计算距离的场景十分消耗资源,按照现在的统计数据100W条数据时候,延迟将会达到140ms。且随着数据的增长,服务器的性能堪忧。当前计算空间距离的方法是使用Lucene算法进行计算,但是开销比较大,不利于用户一眼,文章提出了一种基于三次多项式拟合三角函数的优化算法对空间距离进行计算,文章从距离计算的准确性和快速性两个方面与原有方法进行比较。最后总结出优化算法的优势之处。  相似文献   

10.
对网络计算机模型下海量大数据进行安全稳定的存储,可以提高网络计算机的使用价值,增加其使用周期。但目前的海量大数据存储方法在存储过程中,无法做到对其进行灵活高效的存储,存在大数据存储分布密度较低,存储开销较大等问题。为此,以网络计算机模型体系结构为基础,提出了一种基于ARM的海量大数据存储系统设计方法。该设计方法先利用ARM芯片对网络计算机模型下海量大数据存储系统进行硬件构造,将网络海量大数据中的可利用与不可利用数据进行分类处理,采用VISA结构根据数据分类结果对大数据存储系统软件部分进行设计,依据大数据调度模型和存储相似度特征对大数据存储的时间,质量等方面进行计算,利用计算结果对大数据传输的阈值以及分布密度进行记录,最后根据循环分段的计算方式进行冗余大数据特性压缩,并对海量大数据的常规数据和冗余数据进行存储。实验仿真证明,所提方法提高了海量大数据存储的兼容性,增强了大数据存储的精确性和灵活性。  相似文献   

11.
A multi-conjugate adaptive optics (MCAO) can offer a possibility of widening field of view (FOV) characterized by the isoplanatic angle, and the choose of conjugate height becomes a basic problem for MCAO, which influences the size of iosplanatic angle. Considering the application of lidar, the isoplanatic angle's expressions of two deformable mirrors (DMs) MCAO for uplink and downlink are deduced. The effects of conjugate heights for dual-conjugate AO are thoughtfully discussed, and the isoplanatic angles are further analyzed. The results show that the isopanatic angle varies with the conjugate height and reaches the maximum as the conjugate height is at the optimal altitude. Moreover, the optimal conjugate height changes with the propagation distance.  相似文献   

12.
Due to the limit of response speed of the present single-photon detector, the code rate is still too low to come into practical use for the present quantum key distribution (QKD) system.A new idea is put up to design a quick single-photon detector.This quick single-photon detector is composed of a multi-port optic-fiber splitter and many avalanche photo diodes (APDs).Au of the ports with APDs work on the time division and cooperate with a logic discriminating and deciding unit driven by the clock signal.The operation frequency lies on the number N of ports, and can reach N times of the conventional single-photon detector.The single-photon prompt detection can come true for high repetition-rate pulses.The applying of this detector will largely raise the code rate of the QKD, and boost the commercial use.  相似文献   

13.
14.
Characterization of PolyA and PolyC mismatches by Raman spectroscopy   总被引:1,自引:0,他引:1  
A.C mismatches are studied by Raman spectral characterization of PolyA, PolyC, and their equimolar complex in solution of 0.14 mol/L Na ,pH7.0.Experimental results show that A·C mismatches occur to be A/B (mainly A) conformers, and unlike Watson-Crick base pairing, this kind of mismatches is stabilized by only one hydrogen bond involving cytosine N4H2 and adenine N7.The formation of A·C complex makes the base stacking interactions much stronger, and conformation of the backbone more ordered, which leads to obvious Raman hypochromic effect with some shifts in corresponding bands.  相似文献   

15.
40-GHz clock modulated signal as a pump to improve the efficiency of four-wave mixing (FWM)-based wavelength conversion in a 26.5-km dispersion shifted fiber (DSF) is investigated. The experimental results demonstrate that the conjugated FWM component has higher intensity with the clock pumping than that with the continuous-wave (CW) light pumping. The improvement of FWM-based wavelength conversion efficiency is negligible when the pump power is less than Brillouin threshold. But when the pump power is greater than Brillouin threshold, the improvement becomes significant and increases with the increment of pump power. The improvement can increase up to 9 dB if pump power reaches 17 dBm.  相似文献   

16.
Multi-pulse operation of a Kerr-lens mode-locked femtosecond laser   总被引:2,自引:0,他引:2  
Our experimental results show that the presence of a proper amount of negative group velocity dispersion is essential to multi-pulse operation of a Kerr-lens mode-locked femtosecond laser. We demonstrate that the pulse separations and the number of pulses contained within a cavity round trip are strongly dependent on the initial perturbations. The results allow us to get a better understanding on the influences of the convoluted self-phase modulation and intra-cavity dispersions on the stable multi-pulse oscillation in a Kerr-lens mode-locked femtosecond laser.  相似文献   

17.
Propagation of Helmholtz-Gauss beams in weak turbulent atmosphere   总被引:1,自引:0,他引:1  
Based on the Rytov approximation of light propagation in weak turbulent atmosphere,the closed-form expressions of field and average irradiance of each one of the four fundamental families of Helmholtz-Gauss (HzG)beams:cosine-Gauss beams,stationary Mathieu-Gauss beams,stationary parabolic-Gauss beams,and Bessel-Gauss beams,which are propagating in weak turbulent atmosphere,are obtained.The results show that the field and average irradiance can be written as the product of four factors:complex amplitude depending on the z-coordinate only,a Ganssian beam.a factor of complex phase perturbation induced by atmospheric turbulence,and a complex scaled version of the transverse shape of the non-diffracting beam.The effect of weak atmospheric turbulence on irradiance distribution of the HzG beam can be ignored.  相似文献   

18.
An effective method for reducing speckle noise in digital holography   总被引:1,自引:0,他引:1  
An effective method for reducing the speckle noise in digital holography is proposed in this paper.Different from the methods based on classical filtering technique,it utilizes the multiple holograms which are generated by rotating the illuminating light continuously.The intensity images reconstructed by a series of holograms generated by rotating the illuminating light possess different speckle patterns.Hence by properly averaging the reconstructed intensity fields,the speckle noises can be reduced greatly.Experimental results show that the proposed method is simple and effective to reduce speckle noise in digital holography.  相似文献   

19.
Influence of purity of HfO2 on reflectance of ultraviolet multilayer   总被引:1,自引:0,他引:1  
The impurities in two kinds of HfO2 materials and in their corresponding single layer thin films were determined through glow discharge mass spectrum technology and secondary ion mass spectrometry(SIMS) equipment respectively.It was found that ZrO2 was the main impurity in the two kinds of HfO2 either in the original HfO2 materials or in the electron beam deposited films.In addition,the difference of Zr content in the two kinds of HfO2 single laver films was much laxger than that of the other impurities such as Ti and Fe.which showed that it was just ZrO2 that made the difference between the optical performance of the film products including the two kinds of HfO2.With these two kinds of HfO2 and the same kind of SiO2.we deposited HfO2/SiO2 multilayer reflective coatings at the wavelength of 266 nm.Experimental results showed that the reflectances of these two mirrors were about 99.85% and 99.15% respectively,which agreed well with the designed results what were based on the optical constants obtained from the corresponding single layer thin films.  相似文献   

20.
Microphone array-based speech enhancement has great importance for speech communications and speech recognition. To reduce the aperture of the microphone array and to increase the effect of the speech enhancement will greatly broaden the application areas of the microphone array. An array crosstalk resistant adaptive noise cancellation method is therefore presented. And then an improved spectral subtraction algorithm is further cascaded to obtain better enhancement results. Theoretic analysis and experiments indicate that the proposed scheme needs only a very small microphone array while it simultaneously achieves a higher SNR improvement. Besides, the proposed scheme can be used in many noisy environments and is easy for real-time implementation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号