At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation...
详细信息
ISBN:
(纸本)9781665451451
At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation attacks and other malicious attacks. To solve the above problems, this paper proposes a dynamic password authentication scheme based on sm2, sm3, sm4 algorithm combined with terminal ID, hardware address MAC, and shared password value PW. This scheme can realize the two-way identity authentication between the power distribution master station and the intelligent power distribution terminal. Experiment simulation and security analysis show that this scheme can resist the common malicious attacks such as replay attack, man in the middle attack and impersonation attack. Compared with other schemes, this scheme has more security features and improves the security of identity authentication while reducing the hardware cost of authentication schemes and avoiding the difficulty of digital certificate management and maintenance.
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually *** analysis and utilization of genomic dam gradually entered...
详细信息
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually *** analysis and utilization of genomic dam gradually entered the public view,and the leakage of genomic dam privacy has attracted the attention of *** security of genomic data is not only related to the protection of personal privacy,but also related to the biological information security of the ***,there is still *** genomic dam privacy protection scheme using Shangyong Mima(sm)*** this paper,we analyze the widely used genomic dam file formats and design a large genomic dam files encryption scheme based on the sm ***,we design a key agreement protocol based on the sm2 asymmetric cryptography and use the sm3 hash function to guarantee the correctness of the ***,we used the sm4 symmetric cryptography to encrypt the genomic data by optimizing the packet processing of files,and improve the usability by assisting the computing platform with key *** implementation demonstrates that the scheme can be applied to securely transmit the genomic data in the network environment and provide an encryption method based on sm algorithms for protecting the privacy of genomic data.
Space mapping (sm) is probably one of the most efficient simulation-driven design methodologies used in microwave engineering to date. Nevertheless, its performance heavily depends on the proper selection of the surro...
详细信息
Space mapping (sm) is probably one of the most efficient simulation-driven design methodologies used in microwave engineering to date. Nevertheless, its performance heavily depends on the proper selection of the surrogate model, a computationally cheap representation of the microwave structure under consideration, which is the key component of the sm algorithm. Despite some attempts of automating the set-up of the surrogate model and its parameters, the successful application of sm still requires some user experience. In this work, an efficient method to alleviate this problem is discussed that exploits adaptively constrained parameter extraction and surrogate optimisation processes. As a result, improved convergence properties and overall performance of the sm algorithm are observed. The proposed technique is verified through the design of several microstrip filters. It is also compared with standard sm as well as sm enhanced by a trust-region methodology.
Spectral matching (sm) is an efficient and effective greedy algorithm for solving the graph matching problem in feature correspondence in computer vision and graphics. However, the classic sm algorithm cannot extract ...
详细信息
Spectral matching (sm) is an efficient and effective greedy algorithm for solving the graph matching problem in feature correspondence in computer vision and graphics. However, the classic sm algorithm cannot extract correspondences well when the affinity matrix is sparse and reducible (i.e. its corresponding graph is not connected). This case often happens when the geometric deformations consist of transformations with local inconsistency. The authors analyse this problem and show how the original sm could fail in this scenario. Then, the authors propose a revised two-step pipeline to tackle this issue: (1) decompose the mutually inconsistent local deformations into several consistent transformations which can be solved by individual sm;(2) filter out incorrect correspondences through an automatic thresholding. The authors perform experiments to demonstrate that this modification can effectively handle the coarse correspondence computation in shape or image registration where the global transformation consists of multiple inconsistent local transformations.
Here, a novel approach is proposed that exploits over-flexible surrogate model and adaptively adjusted constraints imposed on the parameter extraction and surrogate optimization processes. As a result, improved perfor...
详细信息
ISBN:
(纸本)9781424449682
Here, a novel approach is proposed that exploits over-flexible surrogate model and adaptively adjusted constraints imposed on the parameter extraction and surrogate optimization processes. As a result, improved performance of the space mapping (sm) algorithm is obtained both with respect to its convergence properties and the quality of the final design. Additionally, our algorithm alleviates the surrogate model selection problem.
Digitization has penetrated into every aspect of life, and network security has become one of the main focuses of future security. China has independently developed security chips with intellectual property rights, an...
详细信息
暂无评论