国家自然科学基金(60473020)

作品数:9被引量:21H指数:3
导出分析报告
相关作者:郑东张有谊乜国雷赵奇永郑燕飞更多>>
相关机构:上海交通大学青海民族学院更多>>
相关期刊:《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》《计算机应用与软件》《计算机工程》更多>>
相关主题:BASED安全性合谋攻击缓冲区溢出可执行代码更多>>
相关领域:自动化与计算机技术更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-9
视图:
排序:
一种可防止合谋攻击的门限签名方案被引量:4
《计算机应用与软件》2008年第12期51-52,共2页张有谊 乜国雷 郑东 
国家自然科学基金资助项目(60473020)
针对现有门限签名方案在抵抗合谋攻击上的弱点,基于离散对数问题提出了一个(t,n)门限签名方案。在该方案中,t个或t个以上的内部成员合作可以代表群体产生有效的门限签名,但不能获取系统秘密,从而有效地阻止了内部恶意成员的合谋攻击。...
关键词:门限签名 秘密共享 合谋攻击 安全性 
基于可执行代码的缓冲区溢出检测模型被引量:4
《计算机工程》2008年第12期120-122,共3页赵奇永 郑燕飞 郑东 
国家自然科学基金资助项目(60473020)
根据缓冲区溢出原理,提出一种基于可执行代码的缓冲区溢出检测模型,给出该模型的理论基础,描述模型构建的过程,提出新的缓冲区引用实例的识别方法。该模型将可执行代码反汇编为汇编代码,建立函数调用关系图和控制流图,分析缓冲区变量及...
关键词:可执行代码 缓冲区溢出 缓冲区溢出检测 约束求解 
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption被引量:2
《Journal of Shanghai Jiaotong university(Science)》2008年第1期67-70,共4页李世群 吴永东 周建英 陈克非 
The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...
关键词:batch decryption secure socket layer (SSL) server public key algorithm 
LFSR-based Ring Signature Scheme被引量:3
《Chinese Journal of Electronics》2007年第3期397-400,共4页ZHENG Dong LI Xiangxue CHEN Kefei 
This work is partially supported by the National Natural Science Foundation of China (No.60473020, No.60573030) and by NLMCSFC (No.9140C1103010602).
To reduce the key sizes and bandwidth, public-key cryptographic systems have been proposed using d-th order characteristic sequences generated by a Linear feedback shift register (LFSR). The paper proposes an LFSR-b...
关键词:Characteristic sequence Linear feedback shift register Ring signature State based discrete logarithm problem 
Trust Based Pervasive Computing被引量:2
《Wuhan University Journal of Natural Sciences》2006年第6期1477-1480,共4页LI Shiqun Shane Balfe ZHOU Jianying CHEN Kefei 
Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...
关键词:trusted computing pervasive computing pervasive computing security 
一种新的基于身份选择密文安全的门限解密方案(英文)被引量:2
《计算机学报》2006年第9期1679-1687,共9页龙宇 陈克非 洪璇 
国家自然科学基金(60303026,60473020,60573030);NLMC基金(51436040405JW0304)资助.
该文提出了一种具有完备安全性的、基于身份的门限解密方案IB-ThDec.方案的安全性可以规约到四元双线性Diffie-Hellman判定问题上.我们在随机预言模型下给出了方案的安全性证明.此外,我们指出IB-ThDec方案可以应用到无证书体制和基于身...
关键词:门限解密 基于身份的密码学 自适应选择密文攻击 基于配对的密码学 
Ising Spin-Based Error Correcting Private-Key Cryptosystems被引量:1
《Journal of Shanghai Jiaotong university(Science)》2006年第2期215-218,共4页郑东 郑燕飞 范武英 
NationalNaturalScienceFoundationofChinaunderGrant(No.60473020);theFounda-tionofNLMC(No.51436050304JW0317)
Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems an...
关键词:Ising spin system AUTHENTICATION ENCRYPTION 
Analysis of Information Leakage in Quantum Key Agreement
《Journal of Shanghai Jiaotong university(Science)》2006年第2期219-223,共5页刘胜利 郑东 陈克非 
NationalNaturalScienceFoundationofChina(Nos.60303026,60473020,60573030)
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presente...
关键词:quantum key agreement ANALYSIS 
Verifiably Encrypted Signatures Without Random Oracles被引量:3
《Journal of Shanghai Jiaotong university(Science)》2006年第2期230-235,共6页李祥学 陈克非 刘胜利 李世群 
NationalNaturalScienceFoundationofChina(Nos.60303026,60573030,60473020)andtheFoundationofNLMC(No.51436040405JW0304)
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis...
关键词:PAIRINGS verifiably encrypted signatures short signatures tight security reduction 
检索报告 对象比较 聚类工具 使用帮助 返回顶部