共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
3.
4.
5.
朗讯的客户群包括面向全球范围的通信服务运营商、政府以及企业。截至2003年9月,朗讯在全球拥有3.3万名员工,2003财年的收入为85亿美元。朗讯由集成网络解决方案部、移动解决方案部和朗讯全球服务部三大运营机构组成,光网络组属于集成网络解决方案部。谈及朗讯重新修订的战略时, 相似文献
6.
7.
8.
9.
《A&S(安防工程商)》2006,(4):108-111
无论是单独由网络摄像机组成的解决方案,还是由模拟摄像机和网络视频服务器组成的解决方案,IP监控都已证明其吸引力越来越大了。短短几年,网络视频监控的“地盘”不断拓展,进入到各行各业当中。以下便是一个教育领域的网络监控案例。[编者按] 相似文献
10.
韩国MAYA EX是笔记本电脑和台式机理想的外接USB音频解决方案,它通过最为常见的USB1.1接口进行连接,令你的机器拥有5.1声道的环绕音频.能进行DTS 5.1和AC-35.1的解码回放.它还拥有光纤输入接口和输出接口。 相似文献
11.
Wouter Teepe 《Autonomous Agents and Multi-Agent Systems》2009,19(1):76-88
BAN logic, an epistemic logic for analyzing security protocols, contains an unjustifiable inference rule. The inference rule
assumes that possession of H(X) (i.e., the cryptographic hash value of X) counts as a proof of possession of X, which is not the case. As a result, BAN logic exhibits a problematic property, which is similar to unsoundness, but not
strictly equivalent to it. We will call this property ‘unsoundness’ (with quotes). The property is demonstrated using a specially
crafted protocol, the two parrots protocol. The ‘unsoundness’ is proven using the partial semantics which is given for BAN logic. Because of the questionable character
of the semantics of BAN logic, we also provide an alternative proof of ‘unsoundness’ which we consider more important. 相似文献
12.
Nan Guo Tianhan Gao Hwagyoo Park 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(5):1781-1791
Attributes proof in anonymous credential systems is an effective way to balance security and privacy in user authentication; however, the linear complexity of attributes proof causes the existing anonymous credential systems far away from being practical, especially on resource-limited smart devices. For efficiency considerations, we present a novel pairing-based anonymous credential system which solves the linear complexity of attributes proof based on aggregate signature scheme. We propose two extended signature schemes, BLS+ and BGLS+, to be cryptographical building blocks for constructing anonymous credentials in the random oracle model. Identity-like information of message holder is encoded in a signature in order that the message holder can prove the possession of the input message along with the validity of a signature. We present issuance protocol for anonymous credentials embedding weak attributes which are referred to what cannot identify a user in a population. Users can prove any combination of attributes all at once by aggregating the corresponding individual credentials into one. The attributes proof protocols on AND and OR relation over multiple attributes are also given. The performance analysis shows that the aggregation-based anonymous credential system outperforms both the conventional Camenisch–Lysyanskaya pairing-based system and the accumulator-based system when prove AND and OR relation over multiple attributes, and the size of credential and public parameters are shorter as well. 相似文献
13.
针对已有匿名订阅系统订阅方式不灵活、用户端运算量大以及用户访问次数不受限制等缺陷,在Canard等人系统的基础上,提出一个面向云服务的轻量级匿名订阅系统。新系统的构造过程使用了关于掌握Au-Susilo-Mu签名的知识证明、改进的集合成员证明以及双线性对运算的性能优化技术。与已有系统相比,新系统同时满足以下性质:允许用户一次性订阅多种服务类型;对用户的访问次数作出限制;不允许用户与他人共享使用电子钱包;为用户提供了较强的隐私保护等级。该系统可证能安全地实现匿名订阅的功能。仿真实验表明,当被证明的秘密值在50~1 050内变化时,用户在Access协议中的运行效率较同类系统提高了79.5%~83.2%。 相似文献
14.
赵丽妍 《数码设计:surface》2010,(11):260-262
儿童的问题已经引起国人的日益关注,而我国童装业起步较晚,存在着各种问题,文章分析了我国童装设计中存在的主要问题及原因,在此基础上,结合童装的特点,提出了若干应对策略。 相似文献
15.
Robert Veroff 《Journal of Automated Reasoning》1996,16(3):223-239
In this article we consider the use of hints to help guide the search for a proof. Under the hints strategy, the value of
a generated clause is determined, in part, by whether or not the clause subsumes or is subsumed by a user-supplied hint clause.
We have implemented the hints strategy and have experimented with it extensively. We summarize our experiences for a variety
of reasoning tasks, including proof checking, proof completion, and proof finding. We conclude that the hints strategy has
value beyond simply “giving the proof to find the proof.” 相似文献
16.
Contrary to persistent myths, a committee initially created Cobol in 1959, not one person. The article outlines the creation and mission of the committee that developed the language and a few of the major inputs and influences on Cobol's initial development, including the people actually involved. This material is based on documents from the 1959 committee work which are in the possession of the author 相似文献
17.
文章介绍了可证明安全协议设计中较为流行的UC模型,对UC模型的提出、证明目标、证明过程等进行了总结和分析。通过一个公钥加密通信协议的举例,解释了UC模型下的证明过程。文章最后给出使用UC模型的一般规律。 相似文献
18.
面向真实云存储环境的数据持有性证明系统 总被引:1,自引:0,他引:1
对数据动态更新和第三方审计的支持的实现方式是影响现有数据持有性证明(provable data possession,简称PDP)方案实用性的重要因素.提出面向真实云存储环境的安全、高效的PDP系统IDPA-MF-PDP.通过基于云存储数据更新模式的多文件持有性证明算法MF-PDP,显著减少审计多个文件的开销.通过隐式第三方审计架构和显篡改审计日志,最大限度地减少了对用户在线的需求.用户、云服务器和隐式审计者的三方交互协议,将MF-PDP和隐式第三方审计架构结合.理论分析和实验结果表明:IDPA-MF-PDP具有与单文件PDP方案等同的安全性,且审计日志提供了可信的审计结果历史记录;IDPA-MF-PDP将持有性审计的计算和通信开销由与文件数线性相关减少到接近常数. 相似文献
19.
This article describes a proof of the functional correctness of a nonrestoring division algorithm and its implementation on an ALU. The first part of the proof deals with the correctness of the division algorithm with respect to a specification of division on the integer level. The second part is concerned with the correctness of the actual implementation, which is proven by checking several refinements of the algorithm. All the proofs have been mechanically checked with the Boyer-Moore theorem-proving system, in some cases making use of the interactive proof checker for the system. 相似文献
20.
Lertworasirikul et al. (2011) proposed an inverse BCC model for the case of VRS. They used an MOLP model to assist them in the process of finding inputs. The proof of the main theorem contains considerable mistakes which invalidate the proof. Moreover, there are some ambiguities about the use of MOLP. The current article points out the drawbacks of Lertworasirikul et al. (2011) and then corrects the use of MOLP in a proposed inverse BCC model. This commentary continues with a revision of the aforementioned theorem with a valid proof. The proposed proof is entirely different from and simpler than Lertworasirikul et al’s. (2011). A numerical example illustrates the proposed models. 相似文献