您的位置: 专家智库 > >

国家自然科学基金(60473023)

作品数:25 被引量:89H指数:5
相关作者:张焕国王丽娜王玉华王邦菊李小红更多>>
相关机构:武汉大学河南工业大学华中农业大学更多>>
发文基金:国家自然科学基金国家科技型中小企业技术创新基金博士科研启动基金更多>>
相关领域:自动化与计算机技术天文地球电子电信理学更多>>

文献类型

  • 25篇期刊文章
  • 5篇会议论文

领域

  • 27篇自动化与计算...
  • 2篇电子电信
  • 1篇天文地球
  • 1篇理学

主题

  • 5篇信任计算
  • 5篇网络
  • 4篇计算机
  • 3篇数据恢复
  • 3篇密码
  • 3篇TRUSTE...
  • 3篇BASED_...
  • 2篇智能卡
  • 2篇匿名
  • 2篇口令
  • 2篇口令认证
  • 2篇加密
  • 2篇安全工作
  • 2篇PROTOC...
  • 2篇SUPPOR...
  • 2篇TPM
  • 2篇USING
  • 2篇INTRUS...
  • 2篇LFSR
  • 2篇BUILDI...

机构

  • 8篇武汉大学
  • 3篇河南工业大学
  • 2篇华中农业大学
  • 1篇中国人民解放...
  • 1篇中国地质大学

作者

  • 5篇张焕国
  • 4篇王丽娜
  • 3篇王玉华
  • 2篇王邦菊
  • 1篇彭国军
  • 1篇詹静
  • 1篇傅建明
  • 1篇管爱红
  • 1篇余纯武
  • 1篇赵大为
  • 1篇侯志强
  • 1篇罗敏
  • 1篇王张宜
  • 1篇王德军
  • 1篇宋军
  • 1篇熊琦
  • 1篇王辉
  • 1篇郭攀峰
  • 1篇杨墨
  • 1篇李小红

传媒

  • 16篇Wuhan ...
  • 2篇武汉大学学报...
  • 2篇武汉大学学报...
  • 2篇计算机工程
  • 1篇通信学报
  • 1篇计算机应用研...
  • 1篇Semico...

年份

  • 2篇2009
  • 4篇2008
  • 7篇2007
  • 11篇2006
  • 6篇2005
25 条 记 录,以下是 1-10
排序方式:
基于NTFS文件系统的计算机取证被引量:10
2006年
为解决计算机取证的数据恢复问题,提出了一种基于新技术文件系统(New technology file system,NTFS)的数据恢复算法.该算法通过分析NTFS文件系统的结构,将待取证的数据分为3类,采取不同的策略进行处理:对于不可组织的数据依据其字节分布频率进行恢复和取证;对于尚可组织的数据依据NTFS文件系统中的相关记录进行数据恢复和取证.结果表明,该算法能重新组织被删除的数据,为计算机取证提供了一种解决途径.
王丽娜杨墨王辉郭攀峰
关键词:计算机取证电子证据NTFS数据恢复
Evolutionary Design of Boolean Functions
<正> We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mu...
WANG Zhang-yi, ZHANG Huan-guo, QIN Zhong-ping, MENG Qing-shu School of Computer, Wuhan University, Wuhan 430072, Hubei, China
文献传递
Evolutionary Random Sequence Generators Based on LFSR被引量:4
2007年
Random numbers play a crucial role in modern security schemes. Couple to the rapid development of cryptog- raphy, the strength of security protocols and encryption algo- rithms consumingly relies on the quality of random number. With simple architecture and faster speed, linear feedback shift register often is selected in many applications. However, the random sequence generated by LFSR can not meet the demand of unpredictability for secure mechanism. Genetic algorithm improves the linear property of LFSR and constructs a novel random sequence generator with longer period and complex architecture.
ZHANG Huanguo WANG Yuhua WANG Bangju WU XIAOping
关键词:生成元安全工作密码
Windows PE病毒中的关键技术分析被引量:6
2006年
介绍了目前流行的各种PE病毒采用的各种感染传播、自我保护和自我隐藏技术,总结了目前计算机病毒的控制权获取方法和传播途径,最后对病毒和反病毒技术的发展趋势作了展望。
彭国军张焕国王丽娜傅建明
关键词:病毒自我保护
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents被引量:1
2006年
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.
GUAN HuanmeiMENG XuejunZHANG Huanguo
XEN Virtual Machine Technology and Its Security Analysis被引量:5
2007年
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine tech- nology become the focus of people’s attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future.
XUE HaifengQING SihanZHANG Huanguo
关键词:虚拟计算机安全技术硬件XEN
安全的非智能卡匿名口令认证方案被引量:2
2008年
对Rhee-Kwon-Lee非智能卡(SC)口令认证方案进行安全分析发现,此方案易受内部攻击,不能实现口令自由更换,并且计算效率不高。基于此提出了一种新的基于散列函数的非SC匿名口令认证方案,新方案采用匿名身份与口令混淆,并结合时间戳来提高安全性和计算效率。新方案弥补了Rhee-Kwon-Lee方案的安全缺陷。而且,与其他同类非SC方案相比较,新方案支持文中理想的非SC口令认证方案的所有安全需求,安全性能最好且计算量小。
王邦菊张焕国王玉华
关键词:口令口令认证散列函数智能卡
Practical Internet Voting Protocol without Strong Physical Assumption
2007年
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assumptions and has the properties of privacy, completeness, soundness, fairness, invariableness, and universal verifiability, receipt-free and coercion-resistant. At the same time it solves some problems in other internet voting proto- cols and the verification progress of universal verifiability is sim- ple and efficient.
MENG BoZHANG Huanguo
关键词:安全协议加密技术
Masquerade Detection Using Support Vector Machine
<正> A new method using support vector data description (SVDD) to distinguish legitimate users from masquerader...
YANG Min. WVNG Li-na. ZHANG Huan-guo, CHEN Wei School of Computer, Wuhan University, Wuhan 430072, Hubei, China
文献传递
Building Intrusion Tolerant Software System
<正> In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that i...
PENG Wen-ling, WANG Li-na, ZHANG Huan-guo, CHEN Wei School of Computer, Wuhan University, Wuhan 430072, Hubei, China
文献传递
共3页<123>
聚类工具0