首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 137 毫秒
1.
阿远 《科学大众》2000,(11):42-43
随着计算机在日常生活中的应用越来越广,现在许多用户开始利用计算机来处理一些安全性要求比较高的信息,或者存在着某些不想让别人了解的文档,这就涉及到对文档和一些应用程序加密的问题。但是随着密码的增多,有时会忘记某些文档的密码,使  相似文献   

2.
本文从实际应用的角度,阐述了标准多用户卡及智能多用户卡的硬件安装和软件设置,用户只要按本文的步骤操作都可完成多用户卡的安装.  相似文献   

3.
对等计算环境(P2P)具有开放性以及对等节点的匿名性和自治的特点,由于缺乏对与之交互的节点的可信程度的知识,相互信任问题成为P2P进一步研究的一个重要方面.为了解决这一问题,提出一种在P2P环境下基于小世界特性的信任机制,通过彼此联系紧密的节点组成社区,反馈使社区内节点实时学习其所关心节点的信任情况.实验结果表明该机制的可行性和有效性,具有较好的信任收敛度和对恶意行为的防范效果.从而保证了P2P环境下请求节点获得服务的可靠性和安全性.  相似文献   

4.
网络环境下高校图书馆信息服务工作的思考   总被引:1,自引:0,他引:1  
对网络环境下信息服务的特点:多用户服务范围,信息服务手段现代化,信息服务功能全面化进行了分析,并提出了拓展高校图书馆信息服务的有效措施。  相似文献   

5.
殷志锋  李兴山 《内江科技》2007,28(5):80-80,86
首先基于蚁群算法建立了一个多用户检测问题的模型,在这个模型中,蚁群算法得到了简化且更加利于并行计算.随后将最大-最小的蚂蚁系统用于多用户检测,通过试验仿真表明,算法操作简单,能显著提高全局搜索能力.  相似文献   

6.
分析了空时CDMA信号模型,在此基础上提出了一种基于MMSE准则的空时CDMA多用户检测算法。并给出了该算法空时多用户检测接收机结构。计算机仿真结果表明本文提出的多用户检测算法在误码率性能上较传统的MMSE单用户检测算法和基于ML准则的空时CDMA多用户检测算法有较大的提高。  相似文献   

7.
针对多用户环境下的多天线正交频分复用下行系统,提出了2种有效的基于迫零波束成型的自适应资源分配算法.所提算法在保证每个用户的速率要求的情况下,通过自适应的功率、子载波和比特分配,最小化系统的发送功率.仿真结果表明,提出的2种次优的分配算法在满足用户的速率要求下能达到很好的系统性能.  相似文献   

8.
杜少军  罗克林  黄亮 《内江科技》2011,32(9):109-110
本文针对一个在线/离线环签名方案,分析指出此方案并不满足匿名性,即给定一个有效的环签名,任何人利用验证算法都能辨别出谁是真正的签名者。进而,提出了一个改进的在线/离线环签名方案。改进的方案不仅弥补了原方案的缺陷实现了无条件匿名性,同时保持了原方案的存在不可伪造性以及简洁高效的特性。  相似文献   

9.
EM算法的吸引力之一在于完全似然函数的求导和最大化通常比不完全数据极大化似然函数的计算简单,但是在某些情况下,即使导出的完全似然函数的E步是直截了当的,M步也不易实现。因此提出了改进M步的ECM算法。相对于EM算法,ECM算法降低了M步的计算复杂度。多用户检测技术(MUD)是通过取消小区间干扰来改进性能,增加系统容量,多用户检测的作用就是去除多用户之间的相互干扰。在高斯噪声环境下,就误码性能及两种算法在高斯噪声下的迭代比较两个方面进行仿真,结果表明,EM算法相比较ECM算法的性能和收敛性几乎一样好。  相似文献   

10.
给出了2种基于身份的类环签名方案,在该方案中签名者能够代表他属于的集合,但是,验证者却不能识别哪个成员的签名.对于一个攻击者而言,即使他拥有所有成员的密钥,他也不能决定是哪个成员签名,从而实现了无条件的匿名性.  相似文献   

11.
Android成为活跃用户量最大的移动终端操作系统的同时,其安全问题日益明显。特别是联系人、短信、照片与我们的个人隐私紧密相连,一旦手机被盗,这些隐私都被违法分子掌握利用,所造成的损失将是无法估计的。文章研究文件监控、手机防盗、短信加密等三方面的安全防护以保障用户的个人隐私和财产安全,为Android手机用户提供了有效的安全保障,并具有极大的应用潜力。  相似文献   

12.
在随机预言模型下定义了一个多接收者签密方案的强安全性模型,该模型满足适应性选择密文内部攻击安全性、选择消息抗存在性伪造和密文匿名安全性;通过分析指出, Li、Hu和Liu等人提出的多接收者签密方案, 不具有适应性选择密文内部攻击安全性和密文匿名性,并给出所定义强安全性模型中的攻击方法;随后提出改进方案,该方案在强安全模型中证明是安全的。  相似文献   

13.
Predictive computation now is a more and more popular paradigm for artificial intelligence. In this article, we discuss how to design a privacy preserving computing toolkit for secure predictive computation in smart cities. Predictive computation technology is very important in the management of cloud data in smart cities, which can realize intelligent computing and efficient management of cloud data in the city. Concretely, we propose a homomorphic outsourcing computing toolkit to protect the privacy of multiple users for predictive computation. It can meet the needs of large-scale users to securely outsource their data to cloud servers for storage, management and processing of their own data. This toolkit, using the Paillier encryption system and Lagrangian interpolation law, can implement most commonly basic calculations such as addition, subtraction, multiplication and division etc. It can also implement secure comparison of user data in the encrypted domain. In addition, we discuss how to implement the derivative of polynomial functions using our homomorphic computing encryption tool. We also introduce its application in neural networks. Finally, we demonstrate the security and efficiency of all our protocols through rigorous mathematical analysis and performance analysis. The results show that our toolkit is efficient and secure.  相似文献   

14.
随着智慧医疗的不断发展与普及,RFID作为其重要技术所引发的安全与隐私问题越来越突出,但目前国内缺乏针对具体安全与隐私威胁的保护方案。首先从一般到特殊分析智慧医疗中RFID安全与隐私风险,然后分析了RFID技术中的伦理及法律,最后比较目前RFID安全防护技术的优缺点与美国、欧盟等国际上对RFID安全与隐私的保障实践。得出RFID安全与隐私全生命周期保护模型SRCE,并对模型中的各个阶段进行了详细说明,可作为政府、医院或相关部门开展 RFID安全与隐私保护的参考和借鉴。  相似文献   

15.
论述了数据库安全与保密的概念、数据库基本安全结构,研究了对数据库中存储的重要数据进行加密处理的方法及密匙的管理,实现了对数据库的加密。  相似文献   

16.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

17.
泄露他人隐私行为意向的影响要素研究   总被引:1,自引:0,他引:1       下载免费PDF全文
吴娜  李文立  吕欣  柯育龙 《科研管理》2015,36(11):139-147
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。  相似文献   

18.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability.  相似文献   

19.
[目的/意义]信息隐私关注和信任是影响智能手机用户的个人信息安全行为的重要因素,对智能手机用户的信息隐私关注和信任与其个人信息安全行为意向关系的探讨有助于更好地理解智能手机用户的信息安全行为。[方法/过程]本文引入以往经验变量,构建了智能手机用户信息隐私关注、信任与其信息安全行为意向之间的作用模型,通过调查问卷收集数据,并利用SmartPLS2.0进行验证。[结果/结论]研究发现:智能手机用户的信息隐私关注对其信息安全行为意向具有正向作用;用户对智能手机生产商和服务商的信任在信息隐私关注和信息安全行为意向之间起到中介作用;智能手机用户信息安全方面的以往经验对其信息隐私关注、信任和信息安全行为意向起正向作用。  相似文献   

20.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号