共查询到20条相似文献,搜索用时 137 毫秒
1.
2.
本文从实际应用的角度,阐述了标准多用户卡及智能多用户卡的硬件安装和软件设置,用户只要按本文的步骤操作都可完成多用户卡的安装. 相似文献
3.
对等计算环境(P2P)具有开放性以及对等节点的匿名性和自治的特点,由于缺乏对与之交互的节点的可信程度的知识,相互信任问题成为P2P进一步研究的一个重要方面.为了解决这一问题,提出一种在P2P环境下基于小世界特性的信任机制,通过彼此联系紧密的节点组成社区,反馈使社区内节点实时学习其所关心节点的信任情况.实验结果表明该机制的可行性和有效性,具有较好的信任收敛度和对恶意行为的防范效果.从而保证了P2P环境下请求节点获得服务的可靠性和安全性. 相似文献
4.
网络环境下高校图书馆信息服务工作的思考 总被引:1,自引:0,他引:1
对网络环境下信息服务的特点:多用户服务范围,信息服务手段现代化,信息服务功能全面化进行了分析,并提出了拓展高校图书馆信息服务的有效措施。 相似文献
5.
首先基于蚁群算法建立了一个多用户检测问题的模型,在这个模型中,蚁群算法得到了简化且更加利于并行计算.随后将最大-最小的蚂蚁系统用于多用户检测,通过试验仿真表明,算法操作简单,能显著提高全局搜索能力. 相似文献
6.
7.
多用户MIMO-OFDM系统中基于迫零波束成型的自适应资源分配算法 总被引:2,自引:0,他引:2
针对多用户环境下的多天线正交频分复用下行系统,提出了2种有效的基于迫零波束成型的自适应资源分配算法.所提算法在保证每个用户的速率要求的情况下,通过自适应的功率、子载波和比特分配,最小化系统的发送功率.仿真结果表明,提出的2种次优的分配算法在满足用户的速率要求下能达到很好的系统性能. 相似文献
8.
9.
10.
给出了2种基于身份的类环签名方案,在该方案中签名者能够代表他属于的集合,但是,验证者却不能识别哪个成员的签名.对于一个攻击者而言,即使他拥有所有成员的密钥,他也不能决定是哪个成员签名,从而实现了无条件的匿名性. 相似文献
11.
12.
在随机预言模型下定义了一个多接收者签密方案的强安全性模型,该模型满足适应性选择密文内部攻击安全性、选择消息抗存在性伪造和密文匿名安全性;通过分析指出, Li、Hu和Liu等人提出的多接收者签密方案, 不具有适应性选择密文内部攻击安全性和密文匿名性,并给出所定义强安全性模型中的攻击方法;随后提出改进方案,该方案在强安全模型中证明是安全的。 相似文献
13.
《Information processing & management》2022,59(2):102880
Predictive computation now is a more and more popular paradigm for artificial intelligence. In this article, we discuss how to design a privacy preserving computing toolkit for secure predictive computation in smart cities. Predictive computation technology is very important in the management of cloud data in smart cities, which can realize intelligent computing and efficient management of cloud data in the city. Concretely, we propose a homomorphic outsourcing computing toolkit to protect the privacy of multiple users for predictive computation. It can meet the needs of large-scale users to securely outsource their data to cloud servers for storage, management and processing of their own data. This toolkit, using the Paillier encryption system and Lagrangian interpolation law, can implement most commonly basic calculations such as addition, subtraction, multiplication and division etc. It can also implement secure comparison of user data in the encrypted domain. In addition, we discuss how to implement the derivative of polynomial functions using our homomorphic computing encryption tool. We also introduce its application in neural networks. Finally, we demonstrate the security and efficiency of all our protocols through rigorous mathematical analysis and performance analysis. The results show that our toolkit is efficient and secure. 相似文献
14.
15.
论述了数据库安全与保密的概念、数据库基本安全结构,研究了对数据库中存储的重要数据进行加密处理的方法及密匙的管理,实现了对数据库的加密。 相似文献
16.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed. 相似文献
17.
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。 相似文献
18.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability. 相似文献
19.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。 相似文献
20.
Jonathan Sterne 《The Information Society》2013,29(4):249-256
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition. 相似文献