The proposed group key establishment scheme reduces both the computational overhead and communication costs and has the high security and usability. 提出的组密钥建立方案有效地降低了组密钥建立过程的计算和通信开销,并具有较高的安全性和可用性。
Although the dynamic computational method can accurately calculate the surge pressure of bottom hole, the stable-state method is much more suited for actual engineering calculation in view of security. 尽管动态计算方法能较准确地计算井底波动压力,但是从安全角度来考虑,稳态法更适合实际工程计算。
Artificial immune system ( AIS) is an emerging computational intelligent system, and is widely used in the computer security fields. 人工免疫系统AIS(ArtificialImmuneSystem)作为新型的计算智能系统,在计算机安全领域得到了广泛应用。从生物免疫机制入手,归纳和分析了目前人工免疫系统在计算机安全领域的应用;
In this paper, an image encryption and decryption algorithm based on chaos sequence is proposed. This algorithm provides low computational complexity, high security and no distortion. 提出了基于混沌序列的图像加密解密算法,该算法由一种新的混沌系统生成整数值混沌序列,然后利用该整数值混沌序列把图像的每一像素变换到另一位置,得到加密图像。
The XTR public key system was introduced at Crypto 2000.Application of XTR in cryptographic protocols leads to substantial savings both in communication an computational overhead without compromising security. XTR公钥系统2000年首次提出,XTR在密码协议领域的应用,在同等安全性下,大大减少了计算量和通信量。
Because of the large improvements in computational efficiency and communication security by exploiting the superposition principle and the non-classical correlation of quantum mechanics, quantum information theory soon attracts much attention and becomes the hottest areas of modern academe. 由于量子力学的叠加原理大幅度地提高了计算效率,而且量子力学的非经典相关使得真正的保密通讯成为可能,量子信息学倍受关注,并成为当今学术界非常关心的热门领域。
Both the symmetric key systems and public key systems currently used are based on the model of computational security. 目前的密钥系统无论是单钥体制还是公钥体制都建立在计算安全的模型上。
Despite of the computational ability of the opponent, the security of quantum cryptographic protocols is only guaranteed by the fundamental principles of quantum mechanics. 量子密码协议的安全性由量子力学基本原理保证,与攻击者的计算能力无关。
With the computational complexity and structural flexibility, discrete logarithm lays good security foundations for the design of cryptographic schemes. 离散对数问题因其计算复杂、结构灵活多变为密码体制的设计提供了良好的安全性基础。
For formal analysis, the analyst first establishes the security model, and then applies the methods based on computational complexity or logical reasoning to analyze the security of the protocol. 所谓形式化方法,指的是分析者通过建立安全模型,用基于计算复杂性,或者逻辑推理的形式化方法来分析协议的安全性。
Secondly, according to the features of wireless network whose computational power is limited, improved the elliptic curve digital signature algorithm, verified the correctness and analyzed the security of improved algorithm. 其次,本文针对无线局域网计算能力有限的特点,改进了传统的椭圆曲线数字签名算法,并对改进后的算法进行了正确性验证和安全性分析。
In the encryption layer the TEA algorithm, which has the 128-bit key and has low computational complexity but high security, is used. 加密层采用的是TEA加密算法,该算法采用128-bit密钥,具有可靠的加密强度,且运算量有限。
Scalar product protocol is one of basic protocols for secure multiparty computation, which is often used in secure computational geometry, private statistical analysis as well as data mining, and provides the important security foundation for these applied protocols. 点积协议是安全多方计算基础协议之一,常用于安全计算几何、保密统计分析以及保密数据挖掘相关协议中,为这些有实用价值的协议提供了重要的安全基础。
Artificial immune system is the emerging field of computational intelligence research, its applications include Industrial Control, Pattern Recognition, economic management, computer network security, anti-spam, etc.. 人工免疫系统是当前计算智能领域的新兴研究热点,其应用领域包括工业控制、模式识别、经济管理、计算机网络安全、反垃圾邮件等。
Unconditional security and computational security are two crucial types for security evaluation of cryptographic strategies. 无条件安全和计算安全是评估密码方案安全性的重要方法。
String matching is an important basic research field in computer science and it occurs naturally as part of text processing, data compression, search engine, computational biology and network security. 串匹配算法是计算机科学领域中一个重要的基础研究领域。在文本处理、数据压缩、搜索引擎、生物计算,以及网络安全等大量的应用中,都需要进行串匹配。
The security of asymmetric system is based on the computational complexity. As the rapid progress in computer science, especially the arising of the concept of quantum computer, the security of asymmetric is challenged severely. 非对称密钥的安全性是建立在计算的复杂性之上的,随着电子计算机技术的发展,特别是量子计算机概念的提出,使其安全性受到了严峻的挑战。
Quantum communication provides a new way for securely transmitting secret message. Despite of the computational ability of the eavesdropper, the security of quantum communication is only guaranteed by the fundamental laws of quantum mechanics. 量子通信为秘密消息的安全传输提供了一种新的思路和方法,其安全性由量子力学基本原理来保证,与攻击者的计算能力无关。
Nowadays many practical cryptosystems are computational security, whereas big challenges are emerging with the improvement of computing capacity and cryptanalysis technology, and especially the rapid development of quanta and DNA computation. 当前实用的密码体制大都是计算安全的,但是随着计算能力的提高和密码分析技术的进步,特别是量子计算和DNA计算的迅猛发展,计算安全的密码体制面临着越来越大的挑战。
Based on the elements of computational complexity and giving an improved image verifiable secret sharing scheme. Prove the security and authentication of the program. 4. 结合计算复杂性的原理,改进了可验证的图像秘密共享方案,提出了一种新的可验证图像秘密共享方案,并且进行了安全性和可验证性的证明。
Traditional cryptographic protocols are mostly constructed on the hardness of some computational problems, e.g. Integer Factoring Problem and Discrete Logarithm Problem, etc. Security based on these problems are called Computational Security. 传统的密码学协议大多基于难解性问题假设,如大数分解问题以及离散对数问题等。建立在这些问题上的安全性,我们称之为计算安全性。