首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 437 毫秒
1.
在云计算环境中,研究第三方互联网支付平台的电子支付密钥数据频度隐匿算法,提高密钥的安全性和可靠性。传统的电子支付密钥的数据频度隐匿算法采用威胁树风险评估模型,容易受到病毒攻击导致密钥失效。提出一种基于群签名和椭圆曲线加密的云计算中电子支付密钥的数据频度隐匿算法。构建云计算中电子支付系统总体设计模型,通过交易数据频度、交易数据深度和交易数据索引特性为特征进行云计算融合处理,由此预测出不同时间片内用户的任务提交规律以及用户期望完成时间,通过对混合云的特征压缩处理,得到压缩特征的熵编码结果,结合云计算的虚拟化技术建立一种基于群签名和椭圆曲线加密的电子支付系统密钥数据频度特征分解方案,实现数据频度隐匿算法改进。仿真结果表明,隐匿性和加密性能较好,保证了电子支付密钥的加密可靠性和不可识别性,为用户识别和选择第三方支付工具提供了一定的参考依据。  相似文献   

2.
提出一种基于串行编码的办公自动化电子文档的文本加密方法,提高保密性能。构建电子文档加密的数据结构模型,对加密数据特征进行密钥构建和特征分析,采用串行译码方法进行数据加密改进,结果表明,该法对电子文档加密性能较好,误码率低于传统算法。  相似文献   

3.
付智军 《科技通报》2019,35(7):161-164
提出了一种用于图像加密的基于非线性科学的数字混沌理论算法。利用外部密钥的映射生成对应的加密系统初始参数,然后利用图像的大小生成大量的密钥流。本文算法引入了密文反馈机制,这样加密算法对明文以及密钥的敏感性得到了提高。依所安全性的等级可以对加密轮数进行调节。实验表明,本文的算法对密钥以及明文有着非常高的敏感度,并且具有较好的统计表现,在算法的运行上,有较高的运算效率。这种效果是由于本文的算法引入了反馈机制,使得加密算法算到改进,提高抵御攻击的能力,使系统的安全性得到提升。  相似文献   

4.
随机码信息加密是保障信息通信安全的基础,传统的随机码信息加密算法采用高阶线性微分解优化的混合加密算法,密钥扩展过程中,链路层加密数据出现非线性突变,采用任何一轮子密钥即可破解全部密钥,加密性能不好。提出一种基于随机码幅度调制的双线程互补信息加密算法。分析了加密信息通信系统的随机编码序列发生原理,进行密钥设计,生成的随机数对信源发出信源密钥,加密序列按位异或运算进行双线程信息互补编码和解码,采用随机码幅度调制生产信息加密密钥,实现加密算法改进,仿真结果表明,采用该算法进行信息加密,有效降低了对方信息系统对密码的识别率,难以被攻击系统检测识别,提高信息安全性。  相似文献   

5.
当前方法对大数据编码采用Turbo扩频编码方法,随着网络中的干扰强度的增大,解码性能不好,抗干扰能力不强。提出一种基于小区间同态映射加密的优化编码方法。首先构建了网络结构模型和大数据协作传输的信道模型,采用小区间同态映射加密方法对网络中的大数据进行数据结构剖分和密钥设计,恢复出信源的编码矢量,实现大数据协作传输优化编码方法。仿真结果表明,采用该方法进行网络中大数据协作传输优化编码,编码矢量在特征空间中具有不可预测性,压缩率较高。  相似文献   

6.
量子通信中的密钥设计是整个量子通信系统安全性的重要保障,传统的密钥设计方法采用固定密钥,无法实现变密钥加密,所以密钥和通信内容被破解的概率很高。提出一种基于色散评价的量子通信变密钥混沌加密实现方法,每次通信时,从混沌学的角度提取所有待通信数据的深层次特征,然后形成本次通信的加密和解密密钥,随通信内容的不同,系统密钥实时变化,在接收端,通过密钥和通信内容的混沌匹配来实现解密,并采用色散特性对加密效果进行评价。通过一组通信内容进行混沌加密性能测试,结果显示,基于色散特性衡量下的混沌加密特性安全性较传统方法大大提高,加密文本被破解的概率是0.0011%。  相似文献   

7.
引入云计算的虚拟化技术,提出一种修正的HARQ加密方案,利用群签名和椭圆曲线算法ECC提高加密协议的执行效率,根据上行CSI信息对重传分组自适应地选择冗余版本数,结合云计算的虚拟化技术建立一种基于修正的HARQ加密方案的可信云平台第三方支付方案,嵌入设计到第三方支付系统中,最后对方案的安全性和效率进行分析。仿真实验表明,采用该算法进行第三方支付信息加密和支付系统嵌入设计,能够提供安全稳定的隐私保护和远程证明,支付平台通信效率提高,安全保护性较强。能有效促进电子商务产业的安全发展。  相似文献   

8.
非对称RSA算法用于数据加密的相关技术探讨   总被引:2,自引:0,他引:2  
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。其算法的安全性基于数论中大素数分解的困难性,从一个公开密钥和密文中恢复出明文的难度等价于两个大素数相乘后,再将两素数从乘积中分解开来。除加密功能外,RSA系统还可以利用公共密钥和专用密钥两对密钥,提供指纹式数字签名。  相似文献   

9.
电子支付是电子商务交易活动中的一个重要环节,涉及到用户与商家和银行等多个部门的信息交互。如何实现安全、可靠、方便的电子支付,是电子商务发展中迫切需要解决的问题。本文对两种占主流地位的安全交易协议SSL和SET进行了比较,在此基础上,提出一种基于SSL&SET的在线安全支付模型,并对其特色进行了分析和论证。  相似文献   

10.
电子支付是电子商务交易活动中的一个重要环节,涉及到用户与商家和银行等多个部门的信息交互.如何实现安全、可靠、方便的电子支付,是电子商务发展中迫切需要解决的问题.本文对两种占主流地位的安全交易协议SSL和SET进行了比较.在此基础上,提出一种基于SSL & SET的在线安全支付模型,并对其特色进行了分析和论证.  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

17.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号