排序方式: 共有49条查询结果,搜索用时 0 毫秒
1.
J.A.M. Naranjo N. Antequera L.G. Casado J.A. López-Ramos 《Journal of Computational and Applied Mathematics》2012
The Extended Euclidean algorithm provides a fast solution to the problem of finding the greatest common divisor of two numbers. In this paper, we present three applications of the algorithm to the security and privacy field. The first one allows one to privately distribute a secret to a set of recipients with only one multicast communication. It can be used for rekeying purposes in a Secure Multicast scenario. The second one is an authentication mechanism to be used in environments in which a public-key infrastructure is not available. Finally, the third application of the Extended Euclidean algorithm is a zero-knowledge proof that reduces the number of messages between the two parts involved, with the aid of a central server. 相似文献
2.
3.
We complete A. Klapper's work on the invariant of a one-term trace form over a finite field of odd characteristic. We apply this to computing the probability of a successful impersonation attack on an authentication code proposed by C. Ding et al. (2005). 相似文献
4.
Eva Borràs Joan Ferré Ricard Boqué Montserrat Mestres Laura Aceña Olga Busto 《Analytica chimica acta》2015
The ever increasing interest of consumers for safety, authenticity and quality of food commodities has driven the attention towards the analytical techniques used for analyzing these commodities. In recent years, rapid and reliable sensor, spectroscopic and chromatographic techniques have emerged that, together with multivariate and multiway chemometrics, have improved the whole control process by reducing the time of analysis and providing more informative results. In this progression of more and better information, the combination (fusion) of outputs of different instrumental techniques has emerged as a means for increasing the reliability of classification or prediction of foodstuff specifications as compared to using a single analytical technique. Although promising results have been obtained in food and beverage authentication and quality assessment, the combination of data from several techniques is not straightforward and represents an important challenge for chemometricians. This review provides a general overview of data fusion strategies that have been used in the field of food and beverage authentication and quality assessment. 相似文献
5.
利用有限域上2-幂零矩阵构作Cartesian认证码 总被引:2,自引:0,他引:2
给出 2 -幂零矩阵的Jordan标准型在相似变换下的稳定群的结构 ,利用有限域上 2 -幂零矩阵构作了一个Cartesian认证码 ,计算出了该认证码的参数 .在假定编码规则按等概率分布选取的条件下 ,计算出了该认证码被成功的模仿攻击的最大概率PI 及被成功的替换攻击的最大概率PS. 相似文献
6.
For q = p
m
and m ≥ 1, we construct systematic authentication codes over finite field using Galois rings. We give corrections of the construction of [2]. We generalize corresponding systematic authentication codes of [6] in various ways. 相似文献
7.
《Analytical letters》2012,45(12):2209-2220
A method of principal component analysis was employed to authenticate genuine olive oil based on Raman spectroscopy, which can reliably distinguish olive oil from other types of oils and can also accurately identify the level of adulteration in a set of olive oil samples contaminated with 5% or more of other types of oils, such as soybean oil, rapeseed oil, sunflower seed oil, and corn oil. The method is very easy, effective, time-saving, and requires minimal sample preparation. Therefore, the method is a promising technique for the rapid authentication application of olive oil. [Supplementary materials are available for this article. Go to the publisher's online edition of Analytical Letters for the following free supplemental resource(s): Additional text and table] 相似文献
8.
Combinatorial characterization of optimal authentication codes with arbitration was previously given by several groups of
researchers in terms of affine α-resolvable + BIBDs and α-resolvable designs with some special properties, respectively.
In this paper, we revisit this known characterization and restate it using a new idea of GOB designs. This newly introduced
combinatorial structure simplifies the characterization, and enables us to extend Johansson’s well-known family of optimal
authentication codes with arbitration to any finite projective spaces with dimension greater than or equal to 3. 相似文献
9.
设W\-m(R)是有限局部环R=Z/p\+kZ上所有m阶交错矩阵所构成的集合(p是素数,k>1). 该文通过确定R上任意m阶交错矩阵的标准形,计算出W\-m(R)在线性群GL\-m(R)作用下的轨道数及n(2r,2t,\{r\-1,\:,r\-1\}[TXX}][DD(X]s\-1[DD)],\:,\{r\-l,\:,r\-l\}[TXX}][DD(X]s\-l[DD)]),其中W(2r,2t,\{r\-1,\:,r\-1\}[TXX}][DD(X]s\-1[DD)],\:,\{r\-l,\:,r\-l\}[TXX}][DD(X]s\-l[DD)])(∑[DD(]l[]i=1[DD)]s\-i=t)表示不变因子为(2r,2t,\{r\-1,\:,r\-1\}[TXX}][DD(X]s\-1[DD)],\:,\{r\-l,\:,r\-l\}[TXX}][DD(X]s\-l[DD)])的所有m阶交错矩阵构成的集合,n(2r,2t,(2r,2t,\{r\-1,\:,r\-1\}[TXX}][DD(X]s\-1[DD)],\:,\{r\-l,\:,r\-l\}[TXX}][DD(X]s\-l[DD)])表示其中的元素个数. 最后,作者利用有限局部环R上交错矩阵的标准形构作了一个Cartesian认证码,并计算出其全部参数. 相似文献
10.
《Analytical letters》2012,45(15):3131-3141
ABSTRACT Principal Component Analysis (PCA) was applied to a set of physico-chemical variables obtained from 41 samples of summer orange juice, in order to reduce the number of variables. Working with the covariance matrix, three components (which explained 98.27% of the variance) were taken. With the correlation matrix, four components which explained: 85.65% of the variance were taken. With the scores corresponding to both matrixes a principal component regression (PCR) was carried out against the dependent variable of Brix grades, so as to obtain two statistical models that would allow the detection of adulterations in pure orange juice, based on dilution and later masking by the addition of sugar. The models were tested with simulated dilutions of 41 samples of juice, to assess the effectiveness of each for the detection of adulterations. Both models turned out to be equally effective, detecting adulterations starting from about 15 % of dilution. 相似文献