期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
1
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
在线阅读 下载PDF
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
2
作者 Yi Ding Jiaqi Zhang +2 位作者 Zhen Qin Yang Zhao Mingsheng Cao 《计算机教育》 2023年第12期71-77,共7页
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic... In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities. 展开更多
关键词 Medical imaging Information security Postgraduate training Countermeasures and suggestions
在线阅读 下载PDF
Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer Network
3
作者 Zhang Guoyin Fu Xiaojing Ma Chunguang 《China Communications》 SCIE CSCD 2012年第10期68-77,共10页
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2... The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication. 展开更多
关键词 MP2PN group key tmnagement attribute-based signature anonymous conmmnica tion
在线阅读 下载PDF
CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation
4
作者 Peng Xiao Qi Zhong +3 位作者 Jingxue Chen Dongyuan Wu Zhen Qin Erqiang Zhou 《Computers, Materials & Continua》 SCIE EI 2024年第6期4703-4724,共22页
In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer diagnosis.Traditional neural networks,while excellent at proc... In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer diagnosis.Traditional neural networks,while excellent at processing natural images,often lack interpretability and adaptability when processing high-resolution digital pathological images.This limitation is particularly evident in pathological diagnosis,which is the gold standard of cancer diagnosis and relies on a pathologist’s careful examination and analysis of digital pathological slides to identify the features and progression of the disease.Therefore,the integration of interpretable AI into smart medical diagnosis is not only an inevitable technological trend but also a key to improving diagnostic accuracy and reliability.In this paper,we introduce an innovative Multi-Scale Multi-Branch Feature Encoder(MSBE)and present the design of the CrossLinkNet Framework.The MSBE enhances the network’s capability for feature extraction by allowing the adjustment of hyperparameters to configure the number of branches and modules.The CrossLinkNet Framework,serving as a versatile image segmentation network architecture,employs cross-layer encoder-decoder connections for multi-level feature fusion,thereby enhancing feature integration and segmentation accuracy.Comprehensive quantitative and qualitative experiments on two datasets demonstrate that CrossLinkNet,equipped with the MSBE encoder,not only achieves accurate segmentation results but is also adaptable to various tumor segmentation tasks and scenarios by replacing different feature encoders.Crucially,CrossLinkNet emphasizes the interpretability of the AI model,a crucial aspect for medical professionals,providing an in-depth understanding of the model’s decisions and thereby enhancing trust and reliability in AI-assisted diagnostics. 展开更多
关键词 Explainable AI security TRUSTWORTHY CrossLinkNet whole slide images
在线阅读 下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
5
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
在线阅读 下载PDF
MIA-UNet:Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation 被引量:2
6
作者 Linfang Yu Zhen Qin +1 位作者 Yi Ding Zhiguang Qin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第11期805-828,共24页
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care system.The fundus ... As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care system.The fundus photography equipment is connected to the cloud platform through the IoT,so as to realize the realtime uploading of fundus images and the rapid issuance of diagnostic suggestions by artificial intelligence.At the same time,important security and privacy issues have emerged.The data uploaded to the cloud platform involves more personal attributes,health status and medical application data of patients.Once leaked,abused or improperly disclosed,personal information security will be violated.Therefore,it is important to address the security and privacy issues of massive medical and healthcare equipment connecting to the infrastructure of IoT healthcare and health systems.To meet this challenge,we propose MIA-UNet,a multi-scale iterative aggregation U-network,which aims to achieve accurate and efficient retinal vessel segmentation for ophthalmic auxiliary diagnosis while ensuring that the network has low computational complexity to adapt to mobile terminals.In this way,users do not need to upload the data to the cloud platform,and can analyze and process the fundus images on their own mobile terminals,thus eliminating the leakage of personal information.Specifically,the interconnection between encoder and decoder,as well as the internal connection between decoder subnetworks in classic U-Net are redefined and redesigned.Furthermore,we propose a hybrid loss function to smooth the gradient and deal with the imbalance between foreground and background.Compared with the UNet,the segmentation performance of the proposed network is significantly improved on the premise that the number of parameters is only increased by 2%.When applied to three publicly available datasets:DRIVE,STARE and CHASE DB1,the proposed network achieves the accuracy/F1-score of 96.33%/84.34%,97.12%/83.17%and 97.06%/84.10%,respectively.The experimental results show that the MIA-UNet is superior to the state-of-the-art methods. 展开更多
关键词 Retinal vessel segmentation security and privacy redesigned skip connection feature maps aggregation hybrid loss function
在线阅读 下载PDF
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks
7
作者 Yang Zhao Jingmin An +1 位作者 Hao Li Saru Kumari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期555-575,共21页
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance. 展开更多
关键词 Aggregate signcryption FAULT-TOLERANT HETEROGENEOUS equality test vehicular sensor network
在线阅读 下载PDF
A Linked List Encryption Scheme for Image Steganography without Embedding
8
作者 Pengbiao Zhao Qi Zhong +3 位作者 Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期331-352,共22页
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks. 展开更多
关键词 STEGANOGRAPHY ENCRYPTION steganography without embedding coverless steganography
在线阅读 下载PDF
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
9
作者 Haifeng Lin Xiangfeng Liu +5 位作者 Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期939-956,共18页
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using audio-based location distinction techniques.In the proposed scheme,traditional cryptographic techniques,such as symmetric encryption algorithm,RSA-based signcryption scheme,and audio-based secure transmission,are utilized to provide authentication,non-repudiation,and confidentiality in the information interaction of the management system.Moreover,an audio-based location distinction method is designed to detect the position change of the devices.Specifically,the audio frequency response(AFR)of several frequency points is utilized as a device signature.The device signature has the features as follows.(1)Hardware Signature:different pairs of speaker and microphone have different signatures;(2)Distance Signature:in the same direction,the signatures are different at different distances;and(3)Direction Signature:at the same distance,the signatures are different in different directions.Based on the features above,amovement detection algorithmfor device identification and location distinction is designed.Moreover,a secure communication protocol is also proposed by using traditional cryptographic techniques to provide integrity,authentication,and non-repudiation in the process of information interaction between devices,Access Points(APs),and Severs.Extensive experiments are conducted to evaluate the performance of the proposed method.The experimental results show that the proposedmethod has a good performance in accuracy and energy consumption. 展开更多
关键词 Acoustic hardware fingerprinting device management IOT location distinction
在线阅读 下载PDF
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
10
作者 Yanan Chen Ting Yao +1 位作者 Haiping Ren Zehao Gan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1497-1513,共17页
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature ne... The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature needs to be converted into a re-signature that can be verified by the new organization.Proxy re-signature(PRS)can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data.Unfortunately,the existing PRS schemes cannot realize forward and backward security.Therefore,this paper proposes the first PRS scheme that can provide key-insulated property,which can guarantee both the forward and backward security of the key.Although the leakage of the private key occurs at a certain moment,the forward and backward key will not be attacked.Thus,the purpose of key insulation is implemented.What’s more,it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key.Besides,the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle model.Finally,the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties. 展开更多
关键词 Proxy re-signature key insulation electronic medical record(EHR) random oracle model
在线阅读 下载PDF
Alliance-Authentication Protocol in Clouds Computing Environment 被引量:7
11
作者 Zhang Qikun Li Yuanzhang +1 位作者 Song Danjie Tan Yuan 《China Communications》 SCIE CSCD 2012年第7期42-54,共13页
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p... Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids 展开更多
关键词 Alliance-Authentication direct product DECOMPOSITION bilinear mapping cloud computing
在线阅读 下载PDF
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN 被引量:1
12
作者 Haoning Pu Zhan Wen +4 位作者 Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li 《International Journal of Intelligent Computing and Cybernetics》 EI 2023年第3期629-646,共18页
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water pumps.Water pumps are widely used in industrial equipment and their fault diagnosis is gaining increa... Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water pumps.Water pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing attention.Considering the time-consuming empirical mode decomposition(EMD)method and the more efficient classification provided by the convolutional neural network(CNN)method,a novel classification method based on incomplete empirical mode decomposition(IEMD)and dual-input dual-channel convolutional neural network(DDCNN)composite data is proposed and applied to the fault diagnosis of water pumps.Design/methodology/approach–This paper proposes a data preprocessing method using IEMD combined with mel-frequency cepstrum coefficient(MFCC)and a neural network model of DDCNN.First,the sound signal is decomposed by IEMD to get numerous intrinsic mode functions(IMFs)and a residual(RES).Several IMFs and one RES are then extracted by MFCC features.Ultimately,the obtained features are split into two channels(IMFs one channel;RES one channel)and input into DDCNN.Findings–The Sound Dataset for Malfunctioning Industrial Machine Investigation and Inspection(MIMII dataset)is used to verify the practicability of the method.Experimental results show that decomposition into an IMF is optimal when taking into account the real-time and accuracy of the diagnosis.Compared with EMD,51.52% of data preprocessing time,67.25% of network training time and 63.7%of test time are saved and also improve accuracy.Research limitations/implications–This method can achieve higher accuracy in fault diagnosis with a shorter time cost.Therefore,the fault diagnosis of equipment based on the sound signal in the factory has certain feasibility and research importance.Originality/value–This method provides a feasible method for mechanical fault diagnosis based on sound signals in industrial applications. 展开更多
关键词 Fault identification Neural nets DDCNN IEMD MFCC
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部