国家自然科学基金(60373087)

作品数:22被引量:409H指数:5
导出分析报告
相关作者:张焕国王玉华王邦菊沈昌祥黄继武更多>>
相关机构:武汉大学河南工业大学华中农业大学中国人民解放军海军计算技术研究所更多>>
相关期刊:《通信学报》《Semiconductor Photonics and Technology》《武汉大学学报(信息科学版)》《Wuhan University Journal of Natural Sciences》更多>>
相关主题:TRUSTED_COMPUTINGTRUSTSECURITYLFSRATTACK更多>>
相关领域:自动化与计算机技术理学电子电信更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
基于LFSR的演化随机序列发生器被引量:2
《计算机工程》2009年第6期192-193,196,共3页王玉华 管爱红 侯志强 詹静 张焕国 
国家自然科学基金资助项目(60673071,60373087,90104005,60473023);河南工业大学博士基金资助项目(2007BS043)
针对基于线性反馈移位寄存器的随机序列发生器产生的随机数线性复杂度低的问题,设计一个新的随机序列发生器,使用遗传算法演化线性反馈移位寄存器产生的随机序列,新产生的序列可以通过SP800-22的测试。测试结果表明,生成的序列周期大、...
关键词:随机序列 安全 遗传算法 线性反馈移位寄存器 
A New Secure Password Authentication Scheme Using Smart Cards
《Wuhan University Journal of Natural Sciences》2008年第6期739-743,共5页WANG Bangju1,2, WANG Yuhua3, ZHANG Huanguo1 1. School of Computer, Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education, Wuhan 430072, Hubei, China 2. School of Science, Huazhong Agricultural University, Wuhan 430070, Hubei, China 3. College of Information Science and Engineering, Henan University of Technology Zhengzhou 450001, Henan, China 
Supported by the National Natural Science Foundation of China (60373087, 60473023).
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can...
关键词:PASSWORD password authentication hash function ATTACK smart card 
安全的非智能卡匿名口令认证方案被引量:2
《通信学报》2008年第10期70-75,共6页王邦菊 张焕国 王玉华 
国家自然科学基金资助项目(60373087,60473023)~~
对Rhee-Kwon-Lee非智能卡(SC)口令认证方案进行安全分析发现,此方案易受内部攻击,不能实现口令自由更换,并且计算效率不高。基于此提出了一种新的基于散列函数的非SC匿名口令认证方案,新方案采用匿名身份与口令混淆,并结合时间戳来提高...
关键词:口令 口令认证 散列函数 攻击 智能卡 
一种安全的双向匿名口令认证方案被引量:3
《武汉大学学报(信息科学版)》2008年第10期1073-1075,1079,共4页王邦菊 张焕国 王张宜 王玉华 
国家自然科学基金资助项目(60373087,60473023)
改进了Hwang-Yeh方案,提出了一种新的匿名口令认证方案。新方案采用匿名和隐藏口令等方式,弥补了Hwang-Yeh方案的安全缺陷,能抵抗更多的安全攻击,如服务器欺骗、伪造攻击等。新方案与Hwang-Yeh方案、Peyravian-Zunic方案以及Peyravian-J...
关键词:口令 口令认证 哈希函数 攻击 
安全协议类型漏洞攻击研究被引量:1
《计算机工程》2008年第8期177-178,181,共3页王鹃 张焕国 高峰 
国家自然科学基金资助项目(90104005,60373087)
类型漏洞攻击是对安全协议攻击的方法之一。当协议主体将所接收消息中的一种类型数据解释成其他类型数据时,就会发生类型漏洞攻击。该文描述了几种典型的类型漏洞攻击实例,结合实例指出了J.Heather等人提出的在消息中添加标识消息类型...
关键词:安全协议 类型漏洞攻击 协议设计 
Self-Dual Permutation Codes over Finite Chain Rings被引量:1
《Wuhan University Journal of Natural Sciences》2007年第6期992-996,共5页YUAN Yuan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005, 60673071)
Permutation codes over finite chain rings are introduced; by using the character of the finite chain rings and the knowledge of representation of group, some conditions for existence or non-existence of self-dual perm...
关键词:finite chain ring group code permutation code self-dual code 
Analysis of affinely equivalent Boolean functions被引量:5
《Science in China(Series F)》2007年第3期299-306,共8页MENG QingShu ZHANG HuanGuo YANG Min WANG ZhangYi 
the National Natural Science Foundation of China (Grant Nos. 69973034, 60373087, 60673071)
By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two Boolean functions are affinely equivalent and to obtain the equivalence relationship if they are...
关键词:Boolean functions Reed-Muller code affinely equivalent INVARIANT 
XEN Virtual Machine Technology and Its Security Analysis被引量:4
《Wuhan University Journal of Natural Sciences》2007年第1期159-162,共4页XUE Haifeng QING Sihan ZHANG Huanguo 
Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The secur...
关键词:virtual machine XEN SECURITY 
Practical Internet Voting Protocol without Strong Physical Assumption
《Wuhan University Journal of Natural Sciences》2007年第1期177-180,共4页MENG Bo ZHANG Huanguo 
Supported by the National Natural Science Foundation of China (60373087,60473023)
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assu...
关键词:information security voting protocol protocol security 
A New Approach of TPM Construction Based on J2810被引量:1
《Wuhan University Journal of Natural Sciences》2007年第1期21-24,共4页ZHAO Bo ZHANG Huanguo HUANG Rui 
Supported by the National Natural Science Foundation of China (90104005,60373087,60473023) and Key Laboratory of Geo-Informatics of State Bureau of Surveying and Mapping(200626)
Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to...
关键词:trusted platform model(TPM) trusted computing J2810 
检索报告 对象比较 聚类工具 使用帮助 返回顶部