您的位置: 专家智库 > >

国家自然科学基金(60473023)

作品数:25 被引量:91H指数:6
相关作者:张焕国王丽娜王玉华王邦菊李小红更多>>
相关机构:武汉大学河南工业大学华中农业大学更多>>
发文基金:国家自然科学基金国家科技型中小企业技术创新基金博士科研启动基金更多>>
相关领域:自动化与计算机技术天文地球电子电信理学更多>>

文献类型

  • 25篇期刊文章
  • 5篇会议论文

领域

  • 27篇自动化与计算...
  • 2篇电子电信
  • 1篇天文地球
  • 1篇理学

主题

  • 7篇TRUSTE...
  • 4篇BASED_...
  • 3篇SECURI...
  • 3篇TRUST
  • 3篇ATTACK
  • 2篇匿名
  • 2篇口令
  • 2篇口令认证
  • 2篇NEW
  • 2篇SECURE
  • 2篇SUPPOR...
  • 2篇TPM
  • 2篇USING
  • 2篇BACKUP
  • 2篇INFORM...
  • 2篇INTRUS...
  • 2篇LFSR
  • 2篇AN
  • 2篇RECOVE...
  • 1篇电子证据

机构

  • 8篇武汉大学
  • 3篇河南工业大学
  • 2篇华中农业大学
  • 1篇中国人民解放...
  • 1篇中国地质大学

作者

  • 5篇张焕国
  • 4篇王丽娜
  • 3篇王玉华
  • 2篇王邦菊
  • 1篇彭国军
  • 1篇詹静
  • 1篇傅建明
  • 1篇管爱红
  • 1篇余纯武
  • 1篇赵大为
  • 1篇侯志强
  • 1篇罗敏
  • 1篇王张宜
  • 1篇王德军
  • 1篇宋军
  • 1篇熊琦
  • 1篇王辉
  • 1篇郭攀峰
  • 1篇杨墨
  • 1篇李小红

传媒

  • 16篇Wuhan ...
  • 2篇武汉大学学报...
  • 2篇武汉大学学报...
  • 2篇计算机工程
  • 1篇通信学报
  • 1篇计算机应用研...
  • 1篇Semico...

年份

  • 2篇2009
  • 4篇2008
  • 7篇2007
  • 11篇2006
  • 5篇2005
  • 1篇2004
25 条 记 录,以下是 1-10
排序方式:
基于NTFS文件系统的计算机取证被引量:10
2006年
为解决计算机取证的数据恢复问题,提出了一种基于新技术文件系统(New technology file system,NTFS)的数据恢复算法.该算法通过分析NTFS文件系统的结构,将待取证的数据分为3类,采取不同的策略进行处理:对于不可组织的数据依据其字节分布频率进行恢复和取证;对于尚可组织的数据依据NTFS文件系统中的相关记录进行数据恢复和取证.结果表明,该算法能重新组织被删除的数据,为计算机取证提供了一种解决途径.
王丽娜杨墨王辉郭攀峰
关键词:计算机取证电子证据NTFS数据恢复
Evolutionary Design of Boolean Functions
We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mutati...
WANG Zhang-yi, ZHANG Huan-guo, QIN Zhong-ping, MENG Qing-shuSchool of Computer, Wuhan University, Wuhan 430072, Hubei, China
文献传递
Evolutionary Random Sequence Generators Based on LFSR被引量:4
2007年
Random numbers play a crucial role in modern security schemes. Couple to the rapid development of cryptography, the strength of security protocols and encryption algorithms consumingly relies on the quality of random number. With simple architecture and faster speed, linear feedback shift register often is selected in many applications. However, the random sequence generated by LFSR can not meet the demand of unpredictability for secure mechanism. Genetic algorithm improves the linear property of LFSR and constructs a novel random sequence generator with longer period and complex architecture.
ZHANG Huanguo WANG Yuhua WANG Bangju WU XIAOping
关键词:SECURITY
Pseudo Random Number Generator Based on Back Propagation Neural Network被引量:3
2007年
Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of random number generator(RNG) is significant in information security. A novel pseudo RNG is proposed for improving the security of network communication. The back propagation neural network(BPNN) is nonlinear, which can be used to improve the traditional RNG. The novel pseudo RNG is based on BPNN techniques. The result of test suites standardized by the U.S shows that the RNG can satisfy the security of communication.
WANG Bang-juWANG Yu-huaNIU Li-pingZHANG Huan-guo
Atomic Electronic Contract Protocol Based on Convertible Signature
A new class of atomicity, namely contract atomicityis presented. A new technical strategy based on convertible...
LIU Yi-chun. WANG Li-na. ZHANG Huan-guoSchool of Computer, Wuhan University, Wuhan 430072, Hubei, China
关键词:ATOMICITY
文献传递
Efficient Multi-Resolution Compression Algorithm for Disk-Based Backup and Recovery被引量:2
2006年
In this paper, we deal with the problem of improving backup and recovery performance by compressing redundancies in large disk-based backup system. We analyze some general compression algorithms; evaluate their scalability and applicability. We investigate the distribution features of the redundant data in whole system range, and propose a multi-resolution distributed compression algorithm which can discern duplicated data at granularity of file level, block level or byte level to reduce the redundancy in backup environment. In order to accelerate recovery, we propose a synthetic backup solution which stores data in a recovery-oriented way and can compose the final data in back-end backup server. Experiments show that this algorithm can greatly reduce bandwidth consumption, save storage cost, and shorten the backup and recovery time. We implement these technologies in our product, called H-info backup system, which is capable of achieving over 10x compression ratio in both network utilization and data storage during backup.
WANG Dejun WANG Lina WANG Hui
关键词:ENTROPY
Windows PE病毒中的关键技术分析被引量:6
2006年
介绍了目前流行的各种PE病毒采用的各种感染传播、自我保护和自我隐藏技术,总结了目前计算机病毒的控制权获取方法和传播途径,最后对病毒和反病毒技术的发展趋势作了展望。
彭国军张焕国王丽娜傅建明
关键词:病毒自我保护
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents被引量:1
2006年
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.
GUAN HuanmeiMENG XuejunZHANG Huanguo
XEN Virtual Machine Technology and Its Security Analysis被引量:6
2007年
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future.
XUE HaifengQING SihanZHANG Huanguo
关键词:XENSECURITY
安全的非智能卡匿名口令认证方案被引量:2
2008年
对Rhee-Kwon-Lee非智能卡(SC)口令认证方案进行安全分析发现,此方案易受内部攻击,不能实现口令自由更换,并且计算效率不高。基于此提出了一种新的基于散列函数的非SC匿名口令认证方案,新方案采用匿名身份与口令混淆,并结合时间戳来提高安全性和计算效率。新方案弥补了Rhee-Kwon-Lee方案的安全缺陷。而且,与其他同类非SC方案相比较,新方案支持文中理想的非SC口令认证方案的所有安全需求,安全性能最好且计算量小。
王邦菊张焕国王玉华
关键词:口令口令认证散列函数智能卡
共3页<123>
聚类工具0