搜索结果: 16-22 共查到“知识库 计算机科学技术 SECURE”相关记录22条 . 查询时间(0.032 秒)
Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks
Internet Mobile Ad hoc Networks Secure routing
2010/2/2
‘Secure routing in Mobile Ad hoc networks’ and
‘Internet connectivity to Mobile Ad hoc networks’ have been dealt
separately in the past research. This paper proposes a light weight
solution for sec...
An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
2007/11/2
AbstractTransformation of the widely used Pedersen's Verifiable Secret Sharing (Pedersen-VSS) to Pedersen-VSS-General secure against general adversary is first presented. Then a misunderstanding about...
AbstractThis paper studies the Verifiable Signature Sharing (V(S) introduced by Franklin and Reiter, which enables the recipient of a signature to share it among n proxies so that a subset of them can...
Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML
Federated Identity & Access Management Virtual Organizations Shibboleth SAML XACML eResearch Toolkits Virtual Research Environment (VRE) Grid
2014/3/12
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their hom...
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Secure Data Warehouse UML profile OCL security confidentiality
2014/3/12
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were develo...
Application of Unique View Consistency for Elimination ofCovert Channels in Real-Time Secure Transaction Processing Systems
Application of Unique View Consistency Elimination ofCovert Channels Real-Time Secure Transaction Processing
2014/3/12
Toprevent data from being accessed by unauthorized users, it is necessary for Credit Card Transaction Processing(CCTP) systems to use multilevel secure database management systems to control concurren...
SECURE ANALOG DATA TRANSMISSION BASED ON RÖSSLER CHAOTIC SYSTEM BEHAVIOR
data transmission encryption chaotic system fuzzy synchronizer
2010/1/13
This paper describes a new methodology for increasing the security of analog
data transmission based on a mixture of the original analog signal with one of the state
variables of Rössler chaoti...