期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
线性移位寄存器在安全RSA模数中应用的研究
1
作者 姜正涛 王勇 +1 位作者 王永滨 王育民 《通信学报》 EI CSCD 北大核心 2010年第5期135-140,共6页
运用线性移位寄存器(LFSR)序列模2个不同素数时的周期一般不同这一性质,尝试构造分解另一类RSA模数的方法;指出对于RSA模数n=pq的一个素因子p,当p2+p+1,p3+p2+p+1,…其中之一仅含有小的素因子时,给出的算法能够分解合数n=pq,并给出了一... 运用线性移位寄存器(LFSR)序列模2个不同素数时的周期一般不同这一性质,尝试构造分解另一类RSA模数的方法;指出对于RSA模数n=pq的一个素因子p,当p2+p+1,p3+p2+p+1,…其中之一仅含有小的素因子时,给出的算法能够分解合数n=pq,并给出了一个基于三级LFSR分解合数的实例来说明算法的具体运算步骤。根据该分解算法,在选取RSA模数时,为确保安全性,除避免已知的不安全因素以外,还需要保证n的素因子p满足p2+p+1,p3+p2+p+1,…均包含大的素因子。 展开更多
关键词 LFSR 素数 整数分解 安全RSA模数
在线阅读 下载PDF
RSA推广循环攻击实效性与弱模问题的研究与分析 被引量:5
2
作者 姜正涛 怀进鹏 王育民 《通信学报》 EI CSCD 北大核心 2009年第6期70-74,共5页
研究了一类RSA安全模数攻击方法的有效性,通过分析指出由于某些攻击方法成功概率可忽略,不能作为选择强安全RSA模数的理由,针对攻击方法的分析总结了当前安全RSA模数的含义,从实际安全角提高参数选择的效率。另外,对RSA模数2个素因子之... 研究了一类RSA安全模数攻击方法的有效性,通过分析指出由于某些攻击方法成功概率可忽略,不能作为选择强安全RSA模数的理由,针对攻击方法的分析总结了当前安全RSA模数的含义,从实际安全角提高参数选择的效率。另外,对RSA模数2个素因子之差d=|p-q|不能太小的结果做了进一步研究,可以认为d为dl,m=ql-pm(l,m∈Z+)比较小时的一种特殊情况,由分析可以看出在选择RSA模数时需注意不要因特意选择比较大的d而忽略了2个素数关系的随机性,防止存在2者某种特殊的函数关系,提高安全性。 展开更多
关键词 RSA 模数安全 循环攻击 攻击有效性 实际安全
在线阅读 下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
3
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
在线阅读 下载PDF
Numerical simulation of protection range in exploiting the upper protective layer with a bow pseudo-incline technique 被引量:15
4
作者 HU Guo-zhong WANG Hong-tu LI Xiao-hong FAN Xiao-gang YUAN Zhi-gang 《Mining Science and Technology》 EI CAS 2009年第1期58-64,共7页
The developing processes of stress and deformation fields of a protected layer after mining an upper-protective layer with a bow pseudo-incline technique were simulated to locate the protection region. The pressure re... The developing processes of stress and deformation fields of a protected layer after mining an upper-protective layer with a bow pseudo-incline technique were simulated to locate the protection region. The pressure relief of the protected layer was analyzed after mining the upper-protective layer. The pressure relief angle along the strike and incline were located according to the roles of protection of the deformation and stress pressure-relief of the protective layer after mining. This results show that the upper-protective layer with the bow pseudo-incline technique have an upper and downside pressure relief angle of 85 and 68 degrees respectively; the distribution of strike pressure relief angles along the pseudo-incline working face is uneven and their values range from 38.3 to 51 degrees. The pressure relief angle of the inclined middle location was the largest. The distribution of the protection region of the upper-protective layer with the bow pseudo-incline teelmique located by practical tests and numerical simulation is essentially consistent, compared with the results obtained by these methods. 展开更多
关键词 bow pseudo-incline technique upper-protective layer protection region 3D numerical simulation
在线阅读 下载PDF
Design Method of Rigid Blast Wall Under the Explosion of Vehicular Bomb 被引量:1
5
作者 WANG Qizhen WU Hao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第1期143-154,共12页
Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The exp... Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference. 展开更多
关键词 blast wall vehicular bomb shock wave safety distance numerical simulation
在线阅读 下载PDF
Numerical simulation of dewatering thick unconsolidated aquifers for safety of underground coal mining 被引量:16
6
作者 HANG Yuan ZHANG Gai-ling YANG Guo-yong 《Mining Science and Technology》 EI CAS 2009年第3期312-316,共5页
With an increase of mining the upper limits under unconsolidated aquifers, dewatering of the bottom aquifer of the Quaternary system has become a major method to avoid water and sand inrushes.In the 8th District of th... With an increase of mining the upper limits under unconsolidated aquifers, dewatering of the bottom aquifer of the Quaternary system has become a major method to avoid water and sand inrushes.In the 8th District of the Taiping Coal Mine in south-western Shandong province, the bottom aquifer of the Quaternary system is moderate to excellent in water-yielding capacity.The base rock above the coal seam is very thin in the concealed coal field of the Carboniferous and Permian systems.Therefore, a comprehensive dewatering plan from both the ground surface and the panel was proposed to lower the groundwater level in order to ensure mining safety.According to the hydrogeologic conditions of the 8th District, we established a numerical model so that we could simulate the groundwater flow in the dewatering process.We obtained the simulation parameters from previous data using backward modeling, such as the average coefficient of permeability of 12 m/d and the elastic storage coefficient of 0.002.From the same model, we predicted the movement of groundwater and water level variables and obtained the visible effect of the dewatering project.Despite the overburden failure during mining, no water and/or sand inrush occurred because the groundwater level in the bottom aquifer was lowered to a safe water level. 展开更多
关键词 mining under water body water and sand inrush unconsolidated aquifer drainage numerical simulation
在线阅读 下载PDF
Prediction and safety analysis of additional vertical stress within a shaft wall in an extra-thick alluvium 被引量:7
7
作者 WANG Yansen ZHANG Chi +1 位作者 XUE Libing HUANG Xinggen 《Mining Science and Technology》 EI CAS 2010年第3期350-356,共7页
An alluvium with a sandy aquifer at the bottom,but lacking an effective impermeable layer between the sandy aquifer and bedrock is referred to as a special alluvial stratum.Impacted by the drainage of the aquifer due ... An alluvium with a sandy aquifer at the bottom,but lacking an effective impermeable layer between the sandy aquifer and bedrock is referred to as a special alluvial stratum.Impacted by the drainage of the aquifer due to mining activities,a shaft wall in this special alluvial stratum will be subject to a downward load by an additional vertical force which must be taken into consideration in the design of the shaft wall.The complexity of interaction between shaft wall and the surrounding walls makes it extremely difficult to determine this additional vertical force.For a particular shaft wall in an extra-thick alluvium and assuming that the friction coefficient between shaft wall and stratum does not change with depth,an analysis of a numerical simulation of the stress within the shaft wall has been carried out.Growth and size of the additional vertical stress have been obtained,based on specific values of the friction coefficient,the modulus of elasticity of the drainage layer and the thickness of the drainage layer.Subsequently, the safety of shaft walls with different structural types was studied and a more suitable structural design,providing an important basis for the design of shaft walls,is promoted. 展开更多
关键词 extra-thick alluvium shaft wall additional vertical stress additional vertical force numerical analysis
在线阅读 下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
8
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
在线阅读 下载PDF
Analytical Model and Algorithm of Fuzzy Fault Tree
9
作者 杨艺 何学秋 +1 位作者 王恩元 刘贞堂 《Journal of China University of Mining and Technology》 2002年第2期176-179,共4页
In the past, the probabilities of basic events were described as triangular or trapezoidal fuzzy number that cannot characterize the common distribution of the primary events in engineering, and the fault tree analyze... In the past, the probabilities of basic events were described as triangular or trapezoidal fuzzy number that cannot characterize the common distribution of the primary events in engineering, and the fault tree analyzed by fuzzy set theory did not include repeated basic events. This paper presents a new method to analyze the fault tree by using normal fuzzy number to describe the fuzzy probability of each basic event which is more suitably used to analyze the reliability in safety systems, and then the formulae of computing the fuzzy probability of the top event of the fault tree which includes repeated events are derived. Finally, an example is given. 展开更多
关键词 fuzzy fault tree basic event fuzzy number membership function
在线阅读 下载PDF
Numerical simulation of scattering wave imaging in a goaf 被引量:2
10
作者 Li Juanjuan Pan Dongming +2 位作者 Liao Taiping Hu Mingshun Wang Linlin 《Mining Science and Technology》 EI CAS 2011年第1期29-34,共6页
Goafs are threats to safe mining.Their imaging effects or those of other complex geological bodies are often poor in conventional reflected wave images.Hence,accurate detection of goafs has become an important problem... Goafs are threats to safe mining.Their imaging effects or those of other complex geological bodies are often poor in conventional reflected wave images.Hence,accurate detection of goafs has become an important problem,to be solved with a sense of urgency.Based on scattering theory,we used an equivalent offset method to extract Common Scattering Point gathers,in order to analyze different scattering wave characteristics between Common Scattering Point and Common Mid Point gathers and to compare stack and migration imaging effects.Our research results show that the scattering wave imaging method is more efficient than the conventional imaging method and is therefore a more effective imaging method for detecting goafs and other complex geological bodies.It has important implications for safe mining procedures and infrastructures. 展开更多
关键词 Goaf Equivalent offset Common Scattering Point gather Scattering wave imaging
在线阅读 下载PDF
A Key Management Scheme Based on Hypergraph for Fog Computing
11
作者 Zhi Li Yanzhu Liu +3 位作者 Di Liu Chunyang Li Wei Cui Guanglin Hu 《China Communications》 SCIE CSCD 2018年第11期158-170,共13页
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s... Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme. 展开更多
关键词 fog computing fog security keymanagement HYPERGRAPH
在线阅读 下载PDF
COMPUTER SIMULATION OF METHANE MIGRATION IN LONGWALL PANELS WITH DESCENSIONAL VENTLIATION
12
作者 赵以蕙 程远平 《Journal of China University of Mining and Technology》 1992年第1期114-123,共10页
It is important to study the methane transport phenomenon in a longwall panel under descensional ventilation conditions. In this paper the gob area is divided into a number of nodes to represent the rectangular percol... It is important to study the methane transport phenomenon in a longwall panel under descensional ventilation conditions. In this paper the gob area is divided into a number of nodes to represent the rectangular percolating elements. The connections between nodes (elements) become branches,so that a network can be formed. Using the mechanics of porous media fluid flow, the mathematical model of air and gas flows has been established. Based on the existing ground pressure theories,the porosity of the inhomogeneous porous media in the gob can be given. In computer simulation it is considered that air pressure and temperature are functions of position ; air density, viscosity, and natural ventilation pressure are functions of temperature,pressure and methane concentration,and the resistance varies with air density and viscosity. Finally,the calculation results are given to show the differences between ascensional and descensional ventilation methods. 展开更多
关键词 descensional ventilation methane migration methane concentration SIMULATION
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部