510 resultados para RSA reticoli Coppersmith
Resumo:
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve cumulative mining accuracy. The vertically partitioned data available with the parties involved cannot provide accurate mining results when compared to the collaborative mining results. To overcome the privacy issue in data disclosure this paper describes a Key Distribution-Less Privacy Preserving Data Mining (KDLPPDM) system in which the publication of local association rules generated by the parties is published. The association rules are securely combined to form the combined rule set using the Commutative RSA algorithm. The combined rule sets established are used to classify or mine the data. The results discussed in this paper compare the accuracy of the rules generated using the C4. 5 based KDLPPDM system and the CS. 0 based KDLPPDM system using receiver operating characteristics curves (ROC).
Resumo:
Nonlinear optical properties (NLO) of a graphene oxide-silver (GO-Ag) nanocomposite have been investigated by the Z-scan setup at Q-switched Nd:YAG laser second harmonic radiation i.e., at 532 nm excitation in a nanosecond regime. A noteworthy enhancement in the NLO properties in the GO-Ag nanocomposite has been reported in comparison with those of the synthesized GO nanosheet. The extracted value of third order nonlinear susceptibility (chi(3)), at a peak intensity of I-0 = 0.2 GW cm(-2), for GO-Ag has been found to be 2.8 times larger than that of GO. The enhancement in NLO properties in the GO-Ag nanocomposite may be attributed to the complex energy band structures formed during the synthesis which promote resonant transition to the conduction band via surface plasmon resonance (SPR) at low laser intensities and excited state transition (ESA) to the conduction band of GO at higher intensities. Along with this photogenerated charge carriers in the conduction band of silver or the increase in defect states during the formation of the GO-Ag nanocomposite may contribute to ESA. Open aperture Z-scan measurement indicates reverse saturable absorption (RSA) behavior of the synthesized nanocomposite which is a clear indication of the optical limiting (OL) ability of the nanocomposite.
Resumo:
158 p. : graf.
Resumo:
Esta pesquisa foi realizada com a intenção de motivar o estudo da criptografia, mostrando que a matemática e a comunicação estão presentes em diversos momentos, tanto no passado quanto no presente. Este trabalho mostra a origem da criptoanálise e toda a sua evolução dando ênfase nos mecanismos de codificação e decodificação através de exemplos práticos. Além disso, alguns métodos criptográficos são destacados como a cifra de substituição monoalfabética, a cifra de Vigenère, a criptografia RSA que é o método mais conhecido de criptografia de chave pública, as cifras de Hill, o método das transformações lineares e o método de Rabin, devido a sua grande importância para a evolução de sistemas computacionais e assinaturas digitais entre outros. Por fim, mostra-se a importância e a necessidade dos recursos criptográficos nos dias de hoje, na tentativa de impedir que hackers e pessoas que fazem mau uso do conhecimento matemático possam causar danos a sociedade, seja por uma simples mensagem ou até mesmo através de situações mais imprudentes como as transações bancárias indevidas
Resumo:
Artemia is a small crustacean that adapted to live in brine water and has been seen in different brine water sources in Iran. Considering the importance of genetic studies manifest inter population differences in species, to estimate genetic structure, detect difference at molecular level and separate different Artemia populations of Iran, also study of phylogenic relationships among them, samples of Artemia were collected from nine region: Urmia lake in West Azerbaijan, Shoor and Inche-Borun lakes in Golestan, Hoze-Soltan and Namak lakes in Qom, Maharloo and Bakhteghan lakes in Fars, Nough pool in Kerman and Mighan pool in Markazi and DNA extracted by phenol-chloroform method. Primers designed on a ribosomal fragment (16s rRNA) of mt DNA sequence and PCR was done. Digestion of the 1566 bp segment PCR product by 10 restriction endonuclease (Alu I, EcoR I, Eco47 I, Hae III, Hind III, Hinf I, Mbo I, Msp I, Rsa I, TaqI) showed 25 different haplotypes: 9 in Urmia, 4 in Shoor and Inche- Borun, 1 in Namak and Hoze-Soltan, 3 in Mighan, 1 in Bakhtegan Maharlo, 3 in Maharloo and 4 in Nough. Measurement of haplotype and nucleotide diversity intra population and nucleotide diversity and divergence inter populations and evolutionary distance between haplotypes showed a high diversity in mitochondrial genome of Artemia in studied regions whose results are similar to those explained for highly geographic expansion organism. In addition, results showed considerable heterogeneity between different populations and there are enough evidences in haplotypic level for separation of studied samples and division of Iranian Artemia to seven populations including Urmia, Shoor and Inche-Borun, Hoze-Soltan and Namak, Maharloo, Bakhteghan, Nough and Mighan. Phylogenetic analysis of the 16S rRNA data set resulted strict consensus and neighbor joining distance trees, demonstrated that all samples were monophyletic and parthenogenetic form derivation from bisexual populations and genetically high resemblance to those of A. urmiana. Study of 270 specimens from different region showed the genus Artemia in Iran clustered into three clades including: 1- Shoor, Inche-Burun, Hoze-Soltan, Namak, Bakhtegan and Maharloo 2- Nough and Mighan 3- Urmia. Totally, obtained results indicated to ability of used techniques for study of inter species diversity, population structure, reveal of phylogenic relationship and dividing of different populations of Artemia in Iran.
Resumo:
This research was conducted to identify Cuttlefish population (Sepia pharaonis) in The Persian Gulf and the Oman Sea using PCR-RFLP. Specimens were collected from )0 different stations. Bottom trawling method was used for sampling from different zones of the Persian Gulf and the Oman Sea, and finally specimens from S. Pharaonis were collected at each station . DNA was extracted by phenol—Coloroform method. One pair primer was designed based on 1As rRNA gene nucleotide sequences. The results obtained from 1 As rRNA gene RFLP, which was reproduced by PCR technique, were analyzed and utilized for study of diversity of the Cuttlefish population. PCR product with o pair base in length achieved for all specimens, which was subjected to enzymatic digestion by A restriction action enzymes: Alu I-Taq I-Mnl I-Rsa I-Hind III-Dra I-vu II and Hae II DNA bands patterns in all specimens digested by those enzymen showed similarity with no any polymorphism. From this result, it can be concluded that there is not any possibility to isolate different populations in the studied Cuttlefish species under exploitation of rRNA gene.
Resumo:
随着网络带宽、计算机处理能力和存储容量的迅速提高,以及各种视频信息处理技术的出现,全程数字化、网络化的视频监控系统优势愈发明显。其高度的开放性、集成性和灵活性为视频监控系统和设备的整体性能提升创造了必要的条件;同时也为整个安防产业的发展提供了更加广阔的发展空间,崭新的应用模式和市场机遇不断涌现。视频监控系统过程向着大型、连续、综合化发展,形成了复杂监控过程,监测控制的要求越来越高,需要更高性能的系统和采用更优秀的控制手段,面临着不能用传统方法解决的新问题。本文概述了目前视频监控中面临的挑战,简要介绍了与视频监控相关的研究领域和研究现状,研究了视频监控中若干亟待解决的问题,主要取得了以下几个方面的研究成果: 第一,提出了基于AdaBoost的改进的人脸检测算法,针对AdaBoost算法的训练速度慢的问题,提出了基于阈值控制的训练方法;同时研究了AdaBoost算法人脸检测方法,利用肤色模型检测人脸区域,并对颜色模型进行了光照补偿。实验结果表明本文的算法具有较好的检测结果。 第二,提出了基于Canny算法的一般目标检测算法,提出了改进的Canny边缘检测算法,研究了Canny算法中噪声抑制的方法,采用改进中心加权的MTM算法有效的抑制噪声。针对Canny检测算法中阈值设置的问题,提出改进的Canny阈值补偿的方法。实验结果表明,改进的Canny算法相比原算法具有更好的目标检测性能。 第三,提出了一种基于均值漂移(Mean Shift)的改进的目标跟踪算法,通过搜索窗口带宽的计算,加权背景信息以及卡尔曼滤波器建模改进了跟踪算法,避免了均值漂移算法中的一些关键问题。对比实验结果表明,本文的改进方法相比原算法具有较好的性能。 第四,研究了视频监控中基于可扩展视频编码(SVC)的技术。首先讨论了视频监控中采用可扩展视频编码(SVC)的优势,探讨了视频监控中采用可扩展视频编码(SVC)的框架。然后针对于视频质量评估问题,设计并实现了基于可扩展视频编码(SVC)的视频质量评估系统Evalvid-SVC,研究了基于可扩展视频编码(SVC)的视频质量评估。 第五,研究并实现了视频数据安全传输技术。提出了基于Diameter的统一认证方案。任何用户想要获取视频资源,都必须通过AAA子系统的认证和授权,授予合法用户以特定的方式使用资源。另外,为了保证监控数据从监控前端安全地传送到视频监控客户端,本文提出了一种有效的保证视频数据安全传输的方案。设计的数据加密算法应用DES算法对前端设备采集到的音视频数据进行加密,并通过定时更新和RSA加密的方式保护和传输DES密钥。
Resumo:
CA(certificate authority)是PKI中的关键设施.CA的私有密钥一旦泄露,该CA签发的所有证书就只能全部作废.保护在线服务CA的私钥也就成为一个非常重要的课题.不是从保护系统或检测入侵出发来保证CA的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露.通过将私钥分发给不同的部件,并保证任何一个在线的部件无法恢复CA的私钥,从而保护了CA私钥的保密性.
Resumo:
论文对两类"强壮"的门限密钥托管方案进行了系统分析,给出多种切实可行的攻击方法,指出它们都是不安全的.首先, 主要利用"可信度"函数等方法首次奠定了对密钥托管协议的形式化分析基础.然后提出了对以上方案的两种阈下信道攻击,前者本质上属于"阴影会话密钥"攻击方法,后者则利用签名算法构造阈下信道.通过成功实施各种欺骗攻击,指出两类方案并未在真正意义上解决诸如"一次监听,永远监听" 、用户密钥碎片有效认证及鉴别恶意托管方等问题.最后分析指出两类方案的"强壮性"值得商榷,并证明一些协议组件是不必要的.
Resumo:
提出了一个组件级的细粒度属性证明方案,用于向远程依赖方证明用户平台满足某种安全属性.与现有的远程证明方案相比,组件属性远程证明具有一定的语义和属性表述性等优势.该方案不但证明粒度细和扩展性强,而且属性证书的颁发、验证和撤销实现简单;本方案以组件承诺的方法保证属性证明的真实性,采用零知识证明实现平台组件的隐私性.基于强RSA假设,在Random Oracle模型下可被证明是安全的.实现的原型系统实验结果表明,组件属性证明是一种灵活、实用、高效的证明,对系统性能没有影响.
Resumo:
对污染土壤修复过程中土壤细菌群落多样性的变化进行研究。【方法】以淹水培养后的模拟铬污染土壤为供试材料,通过直接提取土壤中总细菌DNA,利用细菌专一引物克隆细菌16S rDNA片段,分别建立克隆文库。利用PCR-RFLP技术,分析比较了土壤淹水10 d(对照,S1)、添加Cr(Ⅵ)淹水10 d(S2)、添加Cr(Ⅵ)和Fe(OH)3淹水10 d(S3)及20 d(S4)4个处理中土壤细菌群落的变化。【结果】用专一引物克隆细菌16S rDNA片段,分别建立了克隆文库;用限制性内切酶RsaⅠ进行细菌16S rDNA PCR-RFLP分析,分别得到123,120,97和69个酶切类型,库容值分别为54.92%,55.43%,65.33%和76.60%;Shannon-Wiener指数、Gini指数、物种丰富度指数(dMa)和物种均匀度指数(Jgi)均表现为S1>S2>S3>S4,以上4个指数的变异系数分别为11.51%,1.84%,23.64%和1.55%;基于细菌多样性参数的聚类分析结果,将对照S1和添加Cr(Ⅵ)处理的S2归于一类,而2个添加Fe处理的土壤S3和S4聚为一类。【结论】经过10 d淹水处理,...
Resumo:
为了改进现有防伪数码相机不能处理通过翻拍伪造数码照片的缺陷,提出了一种新的基于安全芯片的防伪数码相机架构。在拍摄时将所拍摄的区域分成多个小单元,并用对焦测距系统测量各个单元到相机的距离。用安全芯片对图像元数据、图像内容及距离信息进行数字签名,并将签名内容及距离信息都保存在图像文件的元数据里。通过验证数字签名有效且距离信息不完全相等来保证图片的真实可信。该防伪数码相机能同时发现照片在拍摄后被篡改和翻拍问题,所拍摄照片真实可信。