首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
刘丽等作者在《装甲兵工程学院学报》第19卷第2期中,利用非齐次线性方程组给出了一种身份认证协议和一种消息认证协议。指出了这2个协议在设计上存在的安全缺陷,并给出了几种可能的攻击方法。  相似文献   

2.
基于非齐次线性方程组的认证协议的研究   总被引:1,自引:1,他引:0  
认证技术是信息安全理论与技术的一个重要方面.认证技术主要包括用户认证和信息认证2个方面.前者用于鉴别用户身份,后者用于保证信息的真实来源.本文基于线性代数的方程组的解的理论建立了一种身份认证协议和一种消息认证协议.通过安全性分析结果表明这个新的身份认证协议能够保证用户身份的正确认证,新的信息认证协议能够保证数据的机密性、完整性,同时能够防止重传攻击认证信息来源.  相似文献   

3.
基于IEEE802.1x协议的体系结构,分析了EAP-TIS认证协议的安全性,详细阐述了EAP-TIS认证协议遭受中间人攻击的过程和原因,并提出了相应的改进方案.通过对Disassociate帧和EAP-Success消息进行加密和数字签名来保证消息的保密性和真实性,从而解决了客户端无法对Disassociate帧和E...  相似文献   

4.
由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication protocol based on optimal path,SCOP)。SCOP协议利用Christofides算法构建最优路径,基站再依据此路径传输组合的认证消息,降低认证开销。同时,SCOP引用物理不可克函数和简易加密操作,确保物理层安全,降低无人机端的计算开销。通过BAN逻辑证明了SCOP协议的正确性。性能分析表明,相比于同类的认证协议,提出的SCOP协议降低了认证开销,减少了无人机端的运算时间。  相似文献   

5.
众所周知,Vo IP技术在未来语音通信中所占的比重越来越大。随着Vo IP的不断发展,基于SIP协议的Vo IP应用也不断增多。但是,由于SIP协议高度依赖于开放的IP网络,使得其安全性逐渐成为关注和探讨的焦点。主要分析了SIP协议网络面临的一些安全威胁,包括典型的外部攻击技术和协议自身存在的漏洞等。探讨了为应对SIP安全威胁提出的加密、认证等安全策略并且分析了这些安全策略的优缺点,提出了针对SIP安全策略进一步改进的方向,旨在不断提高和完善基于SIP协议的安全性能。  相似文献   

6.
云用户与云之间的双向认证是云计算中用户访问云中资源和数据的重要前提。为解决云计算环境下基于口令的身份认证方式存在的问题,并保证海量用户环境下认证的效率,对一个常数复杂性的判定口令相等的百万富翁协议进行了改进,提出了一个公平的安全双方判定相等协议,可以公平且秘密地比对认证方与被认证方所拥有口令的一致性。在上述协议的基础上,基于具有语义安全的加法同态算法――Bresson算法,实现了一个保护云用户和云服务提供者双方隐私的身份认证方案,最后,证明了该身份认证方案在判定相等方面的正确性,并给出了方案的安全性分析。  相似文献   

7.
一种柔性抗攻击网络防护体系结构   总被引:1,自引:0,他引:1  
网络攻击的复杂性、多变性、综合性等趋势对传统各自为政的网络防护系统提出了严峻挑战。为全面、持久、灵活地应对各种网络攻击,提出一种柔性抗攻击网络防护系统的体系结构。该体系结构以安全核为中心,结合认证、事件采集以及各种抗攻击指令的执行,共同完成网络防护任务,体现出网络防护系统的柔性及抗攻击性。  相似文献   

8.
针对当前在云计算中身份认证机制个人信息容易泄漏的问题,提出了一种云计算中的身份认证协议。协议的安全性是基于离散对数的难解问题。协议模型由用户、云服务提供者和注册实体等三个实体组成;通过先属性注册协议、后身份认证协议两个步骤完成整个认证过程;从用户伪装身份和云服务提供者盗取身份信息两个角度,对协议的安全性进行了分析;通过与云计算中基于公钥生成器的协议进行对比以及实验仿真,证明了该协议在对承诺的注册和认证时间上的优越性。  相似文献   

9.
基于Bell态与Two-qutrit态无信息泄漏的量子对话协议   总被引:1,自引:0,他引:1       下载免费PDF全文
基于Einistein-Podolsky-Rosen纠缠对与量子安全直接通信(QSDC),提出了一个新的基于Bell态的量子对话协议.通信双方Alice和Bob只需要进行一次通信即可实现双方之间秘密的同时交换.该方案利用一个随机比特串和检测光子来实现安全性,能够抵抗截获/重放攻击、特洛伊木马攻击和纠缠攻击等典型攻击.很多近期提出的协议中存在严重的信息泄漏,也就是说任何窃听者都可以从合法通信者的公开声明中提取到部分秘密信息,我们的方案很好地克服了这一问题.协议的效率较高,可以达到66.7%,同时由于纠缠态粒子只需要进行一次传输,该方案更简单易行.将该协议推广到two-qutrit态,其安全性仍能得到保证.  相似文献   

10.
针对现有电子现金系统的不足,提出了一类基于椭圆曲线密码的离线电子现金方案.方案中自动更新的现金数据库可以删除过期的电子现金,避免了银行现金数据库可能无限增大的问题;在通信会话协议中,同时实现了签名、认证、加密传输和数据恢复,签名与认证的协议过程同时也是加密通信的过程,减化了常规的密码协议过程.与已有的方案相比,方案中协议与算法简洁、高效,在安全强度不变的条件下,降低了软硬件实现的系统开销,可广泛应用于电子商务等网络业务环境.  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号