Zobrazeno 1 - 10
of 56
pro vyhledávání: '"Kui Geng"'
Publikováno v:
Tongxin xuebao, Vol 43, Pp 108-118 (2022)
Objective: The popularity of network technology makes more and more enterprises and individuals join the wave of the Internet, and data presents an explosive exponential growth trend.With the increasing demand for data security transmission and fine-
Externí odkaz:
https://doaj.org/article/3f748b5b3d844eba87bc513d0bc1d4b7
Publikováno v:
Tongxin xuebao, Vol 43, Pp 58-67 (2022)
Aiming at the problem that current schemes mostly let the latter signer to verify the multiple signatures of the previous signer, and the message is signed and then passed to the next signer, leading to the efficiency problem of long overall signatur
Externí odkaz:
https://doaj.org/article/f1d23451f0b7497da75f4a248f5ccdb7
Publikováno v:
Tongxin xuebao, Vol 42, Pp 55-66 (2021)
In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high per
Externí odkaz:
https://doaj.org/article/d09a4a524afb4edf9fdf9751770a56de
Publikováno v:
天地一体化信息网络, Vol 1, Pp 17-25 (2020)
The characteristics of space-ground network was combed.Against security threats in space-ground network,the security risks faced by measurement control,operation control,terminal access,wireless transmission,transmission,business information system,m
Externí odkaz:
https://doaj.org/article/937dfd7749fd47939ccd6e874e5654a8
Publikováno v:
Tongxin xuebao, Vol 40, Pp 29-40 (2019)
To address the problem that as preventing data leakage on Hadoop platform,the existing encryption schemes suffer from several problems (e.g.,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect da
Externí odkaz:
https://doaj.org/article/dc73a07018574c85ac0f4d3f5c5c5993
Publikováno v:
Tongxin xuebao, Vol 40, Pp 67-76 (2019)
Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constr
Externí odkaz:
https://doaj.org/article/d015f8ff46964b41b5abdfff330204a0
Publikováno v:
Tongxin xuebao, Vol 40, Pp 79-87 (2019)
The rise of e-commerce and other network services have greatly promoted the development of electronic bill service,while traditional data storage schemes can no longer satisfy the rapid access requirements of massive electronic bill data.To solve the
Externí odkaz:
https://doaj.org/article/03620cf405b949d9978d5c06b4943d39
Publikováno v:
Tongxin xuebao, Vol 40, Pp 49-61 (2019)
Personalized collect policy is one of the necessary conditions for effectively monitoring threats in the complex network environment.However,differences in security requirements and threat types make it difficult to effectively generate personalized
Externí odkaz:
https://doaj.org/article/7118e839dbf64a22bf94e8754f88aceb
Publikováno v:
Tongxin xuebao, Vol 39, Pp 11-19 (2018)
Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in s
Externí odkaz:
https://doaj.org/article/568225a670f84ba9a126b74d7976bc16
Publikováno v:
Tongxin xuebao, Vol 38, Pp 57-65 (2017)
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of
Externí odkaz:
https://doaj.org/article/9ae35b1e6830493996dd8d175914e602