您的位置: 专家智库 > >

国家自然科学基金(61272519)

作品数:19 被引量:114H指数:7
相关作者:马兆丰杨义先许艳萍钮心忻黄勤龙更多>>
相关机构:北京邮电大学国家互联网应急中心北京国泰信安科技有限公司更多>>
发文基金:国家自然科学基金国家科技支撑计划福建省自然科学基金更多>>
相关领域:自动化与计算机技术电子电信交通运输工程政治法律更多>>

文献类型

  • 11篇中文期刊文章

领域

  • 9篇自动化与计算...
  • 3篇电子电信
  • 1篇交通运输工程

主题

  • 3篇SECURE
  • 3篇ANDROI...
  • 2篇水印
  • 2篇网络
  • 2篇CLOUD_...
  • 1篇信息安全
  • 1篇信息增益
  • 1篇移动终端
  • 1篇设备安全
  • 1篇身份认证
  • 1篇数据安全
  • 1篇数据包
  • 1篇数据包过滤
  • 1篇数字水印
  • 1篇水印算法
  • 1篇铁路
  • 1篇图像
  • 1篇图像盲水印算...
  • 1篇朴素贝叶斯
  • 1篇权限

机构

  • 6篇北京邮电大学
  • 2篇国家互联网应...
  • 2篇北京国泰信安...
  • 1篇福建广播电视...
  • 1篇福建师范大学
  • 1篇中国铁道科学...

作者

  • 4篇马兆丰
  • 3篇杨义先
  • 2篇黄勤龙
  • 2篇钮心忻
  • 2篇许艳萍
  • 1篇朱建忠
  • 1篇姚志强
  • 1篇伍淳华
  • 1篇支策
  • 1篇郑康锋
  • 1篇张德栋
  • 1篇蒋铭
  • 1篇姚珊
  • 1篇赵亚楠
  • 1篇王中华
  • 1篇侯美佳

传媒

  • 4篇The Jo...
  • 1篇通信学报
  • 1篇计算机工程
  • 1篇北京邮电大学...
  • 1篇铁路计算机应...
  • 1篇信息安全与通...
  • 1篇吉林大学学报...
  • 1篇中国科技论文

年份

  • 1篇2017
  • 2篇2016
  • 5篇2014
  • 2篇2013
  • 1篇2012
19 条 记 录,以下是 1-10
排序方式:
Linux中Netfilter/iptables的研究与应用被引量:3
2014年
Netfilter/iptables是Linux 2.6内核中的通用性功能框架,能够对数据包进行处理。分析了基于Linux内核的Netfilter/iptables框架以及iptables表、链的关系与作用;应用Netfilter/iptables中的包过滤特性建立了内外网间的防火墙,通过手动配置iptables规则的方式对数据包进行有目标性的过滤,防止非法数据攻击,实现了阻隔Ping洪水攻击、拦截特定网段数据包、数据包入队等待后续处理等功能,达到了保证内网安全的效果。
赵亚楠马兆丰
关键词:LINUX内核数据包过滤规则表
铁路网络与信息安全管理系统研究与设计被引量:13
2017年
针对铁路网络安全技术与安全需求的实际状况,提出并设计了一种铁路网络与信息安全管理系统,系统实现了各种网络安全设备、主机设备的集中管理,网络安全事件的实时监控和安全风险的综合评估。文章对系统总体架构、主要功能、关键技术进行了研究和分析,对网络与信息安全管理的发展趋势和下一阶段的工作给出了建议。
王万齐张德栋黄勤龙
关键词:安全事件脆弱性
基于数字水印的PDF完整性认证研究被引量:2
2012年
通过对PDF文档逻辑结构的分析,在不改变原始PDF文档任何显示属性的基础上,提出并设计了一种针对PDF文档的可同时完成完整性验证和版权认证的数字水印算法。该算法根据PDF结构的特点,将各个页面信息流的MD5摘要信息与版权声明信息整合后经AES加密处理生成密文水印信息,密文水印信息最终通过伪装成PDF文档对象的形式,随机嵌入载体文件中。理论分析及实验结果都证明,该算法具有安全、高效和高冗余空间的优点,并且可同时完成载体的完整性验证与版权认证。
支策马兆丰蒋铭钮心忻杨义先
关键词:PDF文档伪装数字水印
Secure personal data sharing in cloud computing using attribute-based broadcast encryption被引量:1
2014年
The ciphertext-policy(CP) attribute-based encryption(ABE)(CP-ABE) emergings as a promising technology for allowing users to conveniently access data in cloud computing. Unfortunately, it suffers from several drawbacks such as decryption overhead, user revocation and privacy preserving. The authors proposed a new efficient and privacy-preserving attribute-based broadcast encryption(BE)(ABBE) named EP-ABBE, that can reduce the decryption computation overhead by partial decryption, and protect user privacy by obfuscating access policy of ciphertext and user's attributes. Based on EP-ABBE, a secure and flexible personal data sharing scheme in cloud computing was presented, in which the data owner can enjoy the flexibly of encrypting personal data using a specified access policy together with an implicit user index set. With the proposed scheme, efficient user revocation is achieved by dropping revoked user's index from the user index set, which is with very low computation cost. Moreover, the privacy of user can well be protected in the scheme. The security and performance analysis show that the scheme is secure, efficient and privacy-preserving.
FU Jing-yiHUANG Qin-longMA Zhao-fengYANG Yi-xian
Encrypted data sharing with multi-owner based on digital rights management in online social networks被引量:1
2014年
The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.
HUANG Qin-longFU Jing-yiMA Zhao-fengYANG Yi-xianNIU Xin-xin
Android智能终端安全综述被引量:30
2016年
针对Android智能终端安全问题,构建Android智能终端安全分层体系。首先从远程防盗、生物身份验证和硬件安全模块方面阐述了Android设备安全的安全威胁及保护措施,然后从无线安全网络、病毒传播查杀和防钓鱼攻击说明了Android网络安全的隐患及防范,之后从内核安全、本地库运行时环境安全和应用框架安全角度介绍了Android操作系统安全的研究内容,接着从静态检测和应用行为动态检测、应用加固和应用评估方面展示了Android应用安全的研究成果,接下来着眼于数据本身总结了Android数据的追踪、加密和备份等安全保护技术,最后结合实际需求展望了Android安全未来在安全增强框架、智能应用行为分析等方向的发展。
许艳萍马兆丰王中华钮心忻杨义先
关键词:ANDROID设备安全网络安全系统安全数据安全
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing被引量:2
2013年
Cloud computing provides a convenient way of content trading and sharing. In this paper, we propose a secure and privacy-preserving digital rights management (DRM) scheme using homomorphic encryption in cloud computing. We present an efficient digital rights management framework in cloud computing, which allows content provider to outsource encrypted contents to centralized content server and allows user to consume contents with the license issued by license server. Further, we provide a secure content key distribution scheme based on additive homomorphic probabilistic public key encryption and proxy re-encryption. The provided scheme prevents malicious employees of license server from issuing the license to unauthorized user. In addition, we achieve privacy preserving by allowing users to stay anonymous towards the key server and service provider. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.
HUANG Qin-longMA Zhao-fengYANG Yi-xianFU Jing-yiNIU Xin-xin
基于DWT-SVD和Turbo码的彩色图像盲水印算法被引量:12
2014年
为进一步提高数字水印系统的性能,提出一种离散小波变换域中基于奇异值分解和Turbo纠错码的彩色图像盲水印算法.首先对数字水印进行混沌加密预处理,然后进行Turbo编码,再把编码后的水印信息嵌入到彩色图像蓝色分量小波分解后低频子带的奇异值矩阵中.提取水印时不需原始载体图像的参与,更便于实际应用.仿真实验结果表明,该水印算法不可见性较好,且对常见攻击和几何攻击具有较好的稳健性.
朱建忠姚志强
关键词:离散小波变换TURBO码混沌加密
基于改进朴素贝叶斯的Android恶意应用检测技术被引量:12
2016年
在对未知应用静态分析的基础上,提取Android Manifest.xml中申请的权限为特征,采用信息增益算法优化选择分类特征,再采用拉普拉斯校准、乘数取自然对数改进的朴素贝叶斯算法创建恶意应用分类器.通过十折交叉试验验证改进的朴素贝叶斯分类器的准度和精度较高,且通过信息增益优化选择的分类特征在保障准确率的情况下能有效提高检测效率.与k最近邻和k-Means分类器相比,改进的朴素贝叶斯分类器具有较好的分类效果.
许艳萍伍淳华侯美佳郑康锋姚珊
关键词:信息增益朴素贝叶斯
Secure and efficient anonymous proxy signature scheme in the random oracle model被引量:1
2013年
Anonymous proxy signature scheme can provide the privacy protection for the proxy signer. Recently, Yu et al. proposed an anonymous proxy signature, which can be viewed as the organic combination of proxy signature and ring signature. However, the efficiency is low. In this paper, we propose an efficient and secure proxy signature with the properties of anonymity and traceability, and it is provably secure in the random oracle model. Compared with Yu et al.'s scheme, the scheme has higher efficiency.
ZHANG De-dongMA Zhao-fengNIU Xin-xinLI Guo-you
共2页<12>
聚类工具0