您的检索:
学者姓名:公备
精炼检索结果:
年份
成果类型
收录类型
来源
综合
合作者
语言
清除所有精炼条件
摘要 :
In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the users' personal information through data analysis. Among the existing privacy protection technologies, the scheme based on group signature has good anonymity, but the existing scheme exists a large number of operations that are difficult to apply to wireless terminals. In this paper, using the powerful offloading capability of edge computing, we propose a blockchain node traceable identity privacy technology scheme based on threshold group signature, and the scheme greatly reduces the computing burden of nodes while achieving node privacy protection. (C) 2021 Elsevier B.V. All rights reserved.
关键词 :
Blockchain Blockchain Signature Signature Traceability Traceability
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Gong, Bei , Cui, Chi , Hu, Mingsheng et al. Anonymous Traceability protocol based on Group Signature for Blockchain [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 160-167 . |
MLA | Gong, Bei et al. "Anonymous Traceability protocol based on Group Signature for Blockchain" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 160-167 . |
APA | Gong, Bei , Cui, Chi , Hu, Mingsheng , Guo, Chong , Li, Xiaochong , Ren, Yuheng . Anonymous Traceability protocol based on Group Signature for Blockchain . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 160-167 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
The encryption and signature schemes based on traditional public key are no longer applicable for devices with limited hardware and software resources in the Internet of Things (IoT), since those schemes consume too much hardware and software. To ensure the security and efficiency of data transmission, we construct a secure and lightweight certificateless hybrid signcryption scheme for Compared with the existing schemes, this scheme only needs one bilinear calculation for one communication, which is computationally efficient for protecting the secure communication between nodes with limited resources in IoT. To meet the security requirements of the complex IoT, based on difficult problem assumption of bilinear pairings, this scheme can simultaneously meet security requirements of the IoT such as confidentiality, unforgability, semipublic verification, forward security known session-specific temporary information security. In addition, we prove the security and correctness of this scheme in Random Oracle Model (ROM). (C) 2021 Elsevier B.V. All rights reserved.
关键词 :
Certificateless hybrid signcryption Certificateless hybrid signcryption Internet of Things Internet of Things Random oracle mode Random oracle mode
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Gong, Bei , Wu, Yong , Wang, Qian et al. A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 23-30 . |
MLA | Gong, Bei et al. "A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 23-30 . |
APA | Gong, Bei , Wu, Yong , Wang, Qian , Ren, Yu-heng , Guo, Chong . A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 23-30 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
<正>新型智慧城市作为我国城市现代化和信息化的最新产物,具有很高的科学价值和经济价值。为构建人机物有机融合的新型智慧城市,需要可信智能系统服务的支撑,但城市环境的复杂多变,导致了人机物可信管控困难,对精准决策、数据共享及隐私保护带来了严峻挑战。面对复杂多变的城市环境,为保障新型智慧城市中由内而外的安全可信,可信任技术成为新型智慧城市快速发展和成功应用中必不可少的一环。
关键词 :
新型智慧城市 新型智慧城市 信任度量 信任度量 数据聚合 数据聚合
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 公备 , 张雷 . 新型智慧城市中的可信任机理研究 [J]. | 华东科技 , 2021 , (04) : 60-63 . |
MLA | 公备 et al. "新型智慧城市中的可信任机理研究" . | 华东科技 04 (2021) : 60-63 . |
APA | 公备 , 张雷 . 新型智慧城市中的可信任机理研究 . | 华东科技 , 2021 , (04) , 60-63 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
In this article, we consider the transmission wave/plate equation with variable coefficients on R-n(n >= 3). By virtue of the Morawetz multipliers in non Euclidean geometries and compactness-uniqueness arguments, we obtain some stability result of the transmission wave/plate system under suitable geometric conditions.
关键词 :
stabilization stabilization variable coefficients variable coefficients wave/plate equation wave/plate equation Riemannian geometry Riemannian geometry
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Gong, Bei , Ning, Zhen-Hu , Yang, Fengyan . STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n [J]. | EVOLUTION EQUATIONS AND CONTROL THEORY , 2021 , 10 (2) : 321-331 . |
MLA | Gong, Bei et al. "STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n" . | EVOLUTION EQUATIONS AND CONTROL THEORY 10 . 2 (2021) : 321-331 . |
APA | Gong, Bei , Ning, Zhen-Hu , Yang, Fengyan . STABILIZATION OF THE TRANSMISSION WAVE/PLATE EQUATION WITH VARIABLE COEFFICIENTS ON R-n . | EVOLUTION EQUATIONS AND CONTROL THEORY , 2021 , 10 (2) , 321-331 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Trusted date collection is the precondition of the security of Internet of Things (IOT). Recently, compressed sensing technology, which can enable the reduction of the energy consumption and time delay of data collection, has been extensively studied in IOT; However, the security of compressed sensing technology in IOT has not been sufficiently considered. Since compressed sensing depends the cooperation between IOT nodes and then sensing data is transparent for all IOT nodes, which is subjected to malicious nodes attack. Therefore, we propose a trusted data collection scheme based on compressed sensing oriented to the IOT. When data collection is tampered with, the scheme can detect malicious nodes. Experiments demonstrate that the proposed scheme can ensure data security with a low energy consumption. © 2021 John Wiley & Sons, Ltd.
关键词 :
Compressed sensing Compressed sensing Data acquisition Data acquisition Energy utilization Energy utilization Internet of things Internet of things Trusted computing Trusted computing
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Ning, Zhenhu , Gong, Bei , Xu, Meng et al. Trusted data collection for Internet of Things [J]. | Concurrency Computation , 2021 , 33 (10) . |
MLA | Ning, Zhenhu et al. "Trusted data collection for Internet of Things" . | Concurrency Computation 33 . 10 (2021) . |
APA | Ning, Zhenhu , Gong, Bei , Xu, Meng , Zhou, Caiqiu . Trusted data collection for Internet of Things . | Concurrency Computation , 2021 , 33 (10) . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
本发明提供一种基于卷积神经网络的加密流量实时分类方法及装置,该方法包括:在每一条加密流量中采样预设数量的数据包;将采样得到的数据包作为字节流,任意相连两个字节作为一个字节对,并确定所有字节对的频率特征;将所有字节对的频率特征,输入预训练的卷积神经网络模型,输出每一条加密流量的数据流类型。该方法对加密流量的原始字节信息采用基于频率特征的表示,而非原始字节直接构造输入特征,从而使卷积神经网络的学习效果加强,分类准确度更高。此外,采样的数据包数量可以根据实际流量捕获情况调整,而不需要重新设计网络模型的结构,具有更好的适用性。由于采用了字节对的频率特征,从而分类所需数据包少,有利于数据分类的实时性。
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 张建标 , 赵宝霖 , 公备 . 基于卷积神经网络的加密流量实时分类方法及装置 : CN202110081372.1[P]. | 2021-01-21 . |
MLA | 张建标 et al. "基于卷积神经网络的加密流量实时分类方法及装置" : CN202110081372.1. | 2021-01-21 . |
APA | 张建标 , 赵宝霖 , 公备 . 基于卷积神经网络的加密流量实时分类方法及装置 : CN202110081372.1. | 2021-01-21 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
本发明公开了一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法,构建恶意代码生成模型。采用群智能算法计算恶意代码的可接受最佳初始样本比例。生成各家族恶意代码,构建相对均衡的恶意代码数据集。本发明利用群智能算法获得各恶意代码家族的可接受最佳样本比例,同时引入cGAN对恶意代码不同家族的数据分布进行学习并进行样本生成,最后对不平衡数据集进行处理,构建各类样本相对均衡的恶意代码数据集,使不同种类的恶意代码在选取时达到一个理想的比例,使正负样本在训练过程中具有相同的地位,更有效的解决了数据不均衡的问题。
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | 梁军淼 , 宁振虎 , 曹东芝 et al. 一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法 : CN202110182166.X[P]. | 2021-02-09 . |
MLA | 梁军淼 et al. "一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法" : CN202110182166.X. | 2021-02-09 . |
APA | 梁军淼 , 宁振虎 , 曹东芝 , 公备 . 一种基于群智能算法和cGAN的恶意代码数据不均衡处理方法 : CN202110182166.X. | 2021-02-09 . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
With the development of information technology, the Internet of Things terminals are vulnerable to threats such as eavesdropping, tampering, and counterfeiting. The application of threshold group signature technology can effectively ensure the security of the system in applications such as battlefield intelligent decision-making, connected vehicles, and intelligent manufacturing. However, the existing threshold group signature schemes lack the two-way trusted authentication mechanism between group members and group manager, and group manager can easily become a security risk for the entire signature system. To solve this problem, this paper proposes a threshold group signature scheme based on elliptic curve that achieves mutual authentication of group members and group manager. The security analysis proves that the proposed scheme is anonymous, traceable, and can resist collusion attacks and frame attacks. The results of performance analysis and comparison also show that under the same security strength, the scheme proposed has shorter signature length, lower calculation amount for signature generation and signature verification, which can effectively reduce the communication and calculation overhead of the IoT terminal, and can be better applied to the Internet of Things application scenarios.
关键词 :
elliptic curve elliptic curve group manager group manager Internet of things Internet of things threshold group signature threshold group signature two-way identity authentication two-way identity authentication
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Gong, Bei , Zhang, Xinyi , Cao, Yang et al. A threshold group signature scheme suitable for the Internet of Things [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2021 , 33 (13) . |
MLA | Gong, Bei et al. "A threshold group signature scheme suitable for the Internet of Things" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 33 . 13 (2021) . |
APA | Gong, Bei , Zhang, Xinyi , Cao, Yang , Li, Zheng , Yang, Jia , Wang, Wei . A threshold group signature scheme suitable for the Internet of Things . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2021 , 33 (13) . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Accurate prediction of the trust relationship is the basis for trusted access and secure interaction between Internet of things nodes. To evaluate the degree of trust, a trust metric is assigned to every node depending on its several attributes. Normal nodes in Internet of things tend to suffer collusion attacks from malicious nodes; thus, the accuracy of the trust measurement decreases. To enhance the security of interaction between massive Internet of things nodes, we propose a multidimensional attribute trust model and a dynamic maintenance mechanism of a trusted group. The proposed model provides a reference for the selection and evaluation of node multidimensional attribute factors to adapt to different Internet of things application scenarios. The dispersion of satisfaction records is used to discover abnormal data and weaken its influence on the calculation of the node’s comprehensive trust evaluation. The construction of trusted groups provides an architectural foundation for the application of group signature that maintains low network overhead. The performance of multidimensional attribute trust model and dynamic maintenance mechanism is verified using Netlogo. Simulation results show the efficiency of the proposed model to classify the malicious nodes and honest nodes, as well as to build a trusted group that could ensure honest nodes occupy the major proportion. © The Author(s) 2021.
关键词 :
Dynamics Dynamics Internet of things Internet of things Network security Network security Trusted computing Trusted computing
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Chen, Jinghan , Gong, Bei , Wang, Yubo et al. Construction of Internet of things trusted group based on multidimensional attribute trust model [J]. | International Journal of Distributed Sensor Networks , 2021 , 17 (1) . |
MLA | Chen, Jinghan et al. "Construction of Internet of things trusted group based on multidimensional attribute trust model" . | International Journal of Distributed Sensor Networks 17 . 1 (2021) . |
APA | Chen, Jinghan , Gong, Bei , Wang, Yubo , Zhang, Yu . Construction of Internet of things trusted group based on multidimensional attribute trust model . | International Journal of Distributed Sensor Networks , 2021 , 17 (1) . |
导入链接 | NoteExpress RIS BibTex |
摘要 :
Wireless sensor network is a key technology in Internet of Things. However, due to the large number of sensor nodes and limited security capability, aging nodes and malicious nodes increase. In order to detect the untrusted nodes in the network quickly and effectively and ensure the reliable operation of the network, this paper proposes a dynamic network security mechanism. Firstly, the direct trust value of the node is established based on its behavior in the regional information interaction. Then, the comprehensive trust value is calculated according to the trust recommendation value and energy evaluation value of other high-trust nodes. Finally, node reliability and management nodes are updated periodically. Malicious nodes are detected and isolated according to the credibility to ensure the dynamic, safe, and reliable operation of the network. Simulation results and analysis show that the node trust value calculated by this mechanism can reflect its credibility truly and accurately. In terms of reliable network operation, the mechanism can effectively detect malicious nodes, with higher detection rate, avoid the risk of malicious nodes as management nodes, reduce the energy consumption of nodes, and also play a defensive role in DOS attacks in wireless sensor networks. © 2021 Guiping Zheng et al.
关键词 :
Denial-of-service attack Denial-of-service attack Dynamics Dynamics Energy utilization Energy utilization Network security Network security Sensor nodes Sensor nodes
引用:
复制并粘贴一种已设定好的引用格式,或利用其中一个链接导入到文献管理软件中。
GB/T 7714 | Zheng, Guiping , Gong, Bei , Zhang, Yu . Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks [J]. | Wireless Communications and Mobile Computing , 2021 , 2021 . |
MLA | Zheng, Guiping et al. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks" . | Wireless Communications and Mobile Computing 2021 (2021) . |
APA | Zheng, Guiping , Gong, Bei , Zhang, Yu . Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks . | Wireless Communications and Mobile Computing , 2021 , 2021 . |
导入链接 | NoteExpress RIS BibTex |
导出
数据: |
选中 到 |
格式: |