搜索结果: 16-27 共查到“计算机科学技术 SECURE”相关记录27条 . 查询时间(0.25 秒)
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
Users and Network Management for Secure Interworking and Roaming in WiMAX, 3G and Wi-Fi Networks Using RII Architcture
Network Management Secure Interworking Roaming WiMAX 3G Wi-Fi Networks
2010/9/20
The increase in the usage of different access technologies has led to aneed for new mechanisms to manage interworking and roaming betweendifferent network technologies. To provide secure and seamless ...
Whena Supervisory Control and Data Acquisition (SCADA) system monitors andmanages other complex infrastructures through the use of distributedtechnologies, it becomes a critical infrastructure by itse...
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services
Data Warehouses Security MDA OLAP QVT
2014/3/11
Data Warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefo...
Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks
Internet Mobile Ad hoc Networks Secure routing
2010/2/2
‘Secure routing in Mobile Ad hoc networks’ and
‘Internet connectivity to Mobile Ad hoc networks’ have been dealt
separately in the past research. This paper proposes a light weight
solution for sec...
An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
2007/11/2
AbstractTransformation of the widely used Pedersen's Verifiable Secret Sharing (Pedersen-VSS) to Pedersen-VSS-General secure against general adversary is first presented. Then a misunderstanding about...
AbstractThis paper studies the Verifiable Signature Sharing (V(S) introduced by Franklin and Reiter, which enables the recipient of a signature to share it among n proxies so that a subset of them can...
SECURE COMPUTING喜获“计算机世界”两项大奖
计算机世界 防火墙和 邮件网关捧
2007/2/8
四川在线2007年2月8日报道 日前,企业网关安全行业的领先企业Secure Computing Corporation (纳斯达克:SCUR)的Sidewinder防火墙和Ironmail邮件网关捧得2006年度《计算机世界》“产品奖”和“解决方案奖”两项类别大奖。
Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML
Federated Identity & Access Management Virtual Organizations Shibboleth SAML XACML eResearch Toolkits Virtual Research Environment (VRE) Grid
2014/3/12
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their hom...
A UML 2.0/OCL Extension for Designing Secure Data Warehouses
Secure Data Warehouse UML profile OCL security confidentiality
2014/3/12
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were develo...
Application of Unique View Consistency for Elimination ofCovert Channels in Real-Time Secure Transaction Processing Systems
Application of Unique View Consistency Elimination ofCovert Channels Real-Time Secure Transaction Processing
2014/3/12
Toprevent data from being accessed by unauthorized users, it is necessary for Credit Card Transaction Processing(CCTP) systems to use multilevel secure database management systems to control concurren...
SECURE ANALOG DATA TRANSMISSION BASED ON RÖSSLER CHAOTIC SYSTEM BEHAVIOR
data transmission encryption chaotic system fuzzy synchronizer
2010/1/13
This paper describes a new methodology for increasing the security of analog
data transmission based on a mixture of the original analog signal with one of the state
variables of Rössler chaoti...