搜索结果: 1-15 共查到“军事学 IP”相关记录20条 . 查询时间(0.203 秒)
复旦大学计算机科学与技术学院信息安全课件 IP Security。
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
MLP CNNs
2018/4/4
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Verifiable E-Voting End-to-End Verifiability E2E
2016/7/5
Nearly all verifiable e-voting schemes require trusted tallying
authorities to guarantee voter privacy. An exception is the DRE-i
system which removes this requirement by pre-computing all encrypted...
Hardware Trojan Horses in Cryptographic IP Cores
Hardware Trojan Horses Cryptographic IP Cores
2016/1/7
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is th...
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
applications key management
2014/3/12
We present the Plug-and-Play IP Security (PnP-IPsec) protocol. PnP-IPsec automatically establishes IPsec security associations between gateways, avoiding the need for manual administration and coordin...
Keyed Side-Channel Based Hashing for IP Protection using Wavelets
IP Protection Embedded Systems
2014/3/12
The protection of intelligent property (IP) is a challenging task, especially in secured embedded systems where program code that is supposed to be a plagiarism cannot be simply read-out for further i...
MQ^*-IP:An Identity-based Identification Scheme without Number-theoretic Assumptions
Identity-based Identification Scheme Number-theoretic Assumptions
2010/3/16
In this article, we propose an identification scheme which is based on the two combi-
natorial problems Multivariate Quadratic equations (MQ) and Isomorphism of Polyno-
mials (IP). We show that this...
A Key Establishment IP-Core for Ubiquitous Computing
Key Establishment IP-Core Man-In-The-Middle attack Tree Parity
2009/3/2
A most critical and complex issue with regard to constrained
devices in the ubiquitous and pervasive computing
setting is secure key exchange. The restrictions motivate
the investigation and discus...
具有用户匿名性的移动IP注册协议
移动IP 用户匿名性 注册
2009/1/22
为了解决移动IP注册过程中的匿名认证问题,提出了一个具有用户匿名性的移动IP注册协议.移动用户通过对家乡代理的身份和新建立的Diffie-Hellman 密钥进行Hash运算,并把该Hash值与移动用户的真实身份进行异或,来构造注册请求消息中的临时身份标识符; 家乡代理把接收到的临时身份标识符和重新计算的Hash值进行异或可以得出移动用户的真实身份;每次注册请求消息中的临时身份标识符都不断变化,从...
The transmission of voice communications as datagram
packets over IP networks, commonly known as Voice-over-
IP (VoIP) telephony, is rapidly gaining wide acceptance.
With private phone conversation...
高速RC4流加密IP的实现与产业化
流加密 流密码 RC4算法
2008/8/22
该项目技术支持S–BOX计算和初始化。支持8种加密/解密命令。采用0.13um深亚微米技术。250MHz时钟频率。处理带宽达到2Gbps。3级内部流水线,每个时钟周期输出一个字节结果。实现两个上下文存储空间,支持前后台并行操作。在前台加密/解密的同时,后台对上下文的读写。支持两种接口即串行接口和并行接口。提供软核和硬核。提供IP验证环境。该高速RC4流加密IP可进行IP技术转让。
TCP/IP通信的监听与阻断
三次握手 阻断 TCP/IP 监听
2008/5/20
研究TCP/IP网络的监听,“三次握手”建立连接的过程,以及拆断TCP“三次握手”的方法。以RedHat 9.0(Linux)、Windows 2000 Server、Windows XP Professional、Windows XP Home、Windows 2003为主要操作系统的北京交通大学校园网某网段为实验环境,分别在RedHat 9.0和Windows XP 下用C和VC++6.0编程...
DDoS攻击IP追踪及攻击源定位技术研究
IP追踪 攻击源定位 DDoS攻击
2008/5/20
IP追踪和攻击源定位技术在DDoS攻击防御研究中有重要意义。文章对当前现有的IP追踪和攻击源定位技术作了系统的分类,分别对它们作了全面的分析并比较了相互之间的异同及优缺点。针对当前的IP追踪和攻击源定位技术现状讨论了其未来发展趋势。
小IP报文攻击的入侵检测方法研究
网络安全 入侵检测 IP报文攻击
2008/5/19
入侵检测技术是网络安全领域中的新技术,但它发展还不成熟,很多攻击方法利用它的缺陷进行攻击。其中小IP报文攻击利用Windows和Linux对有数据重叠的报文处理方式不一样进行攻击。论文提出了小IP报文攻击的入侵检测方法,并采用Snort工具进行实验,使得Snort和被保护主机对有数据重叠的报文的处理方式一致,从而使Snort发生误报、漏报的次数明显减少,为实现网络安全提供了有益的借鉴。
...