首页 > 最新文献

Journal of Electronics and Information Science最新文献

英文 中文
Efficient identity based ring signature scheme in prime order group 基于身份的高效素阶群环签名方案
Pub Date : 2021-01-01 DOI: 10.23977/jeis.2021.060211
Jingyuan Li
Aiming at the problem of long signature generation and verification time caused by low operation efficiency in ring signature algorithm based on composite order group, an asymmetric identity based ring signature scheme based on prime order group is proposed. The model definition and specific identity based ring signature scheme design of the proposed scheme are described, and the correctness and security of the proposed scheme are analyzed. Finally, the efficiency of the core operation part of the algorithm is explained. Compared with the correlation signature algorithm based on composite order group, the optimization has a great improvement in operation overhead and performance, and the designed scheme is unforgeable. The designed signature scheme meets the unconditional anonymity and unforgeability of ring signature.
针对基于复合阶群的环签名算法运行效率低导致签名生成和验证时间长的问题,提出了一种基于素数阶群的基于非对称身份的环签名方案。描述了该方案的模型定义和具体的基于身份的环签名方案设计,并分析了该方案的正确性和安全性。最后,对算法核心运算部分的效率进行了说明。与基于复合阶群的相关签名算法相比,优化后的算法在运行开销和性能上有较大的提高,且设计的方案具有不可伪造性。所设计的签名方案满足环签名的无条件匿名性和不可伪造性。
{"title":"Efficient identity based ring signature scheme in prime order group","authors":"Jingyuan Li","doi":"10.23977/jeis.2021.060211","DOIUrl":"https://doi.org/10.23977/jeis.2021.060211","url":null,"abstract":"Aiming at the problem of long signature generation and verification time caused by low operation efficiency in ring signature algorithm based on composite order group, an asymmetric identity based ring signature scheme based on prime order group is proposed. The model definition and specific identity based ring signature scheme design of the proposed scheme are described, and the correctness and security of the proposed scheme are analyzed. Finally, the efficiency of the core operation part of the algorithm is explained. Compared with the correlation signature algorithm based on composite order group, the optimization has a great improvement in operation overhead and performance, and the designed scheme is unforgeable. The designed signature scheme meets the unconditional anonymity and unforgeability of ring signature.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Water Conservancy Data Acquisition and Big Data Service Based on Multi-data Sources 基于多数据源的水利数据采集与大数据服务
Pub Date : 2019-01-25 DOI: 10.23977/JEIS.2019.41001
Xu Zhu
To reflect the application value of data development, based on the data of multiple data sources, the water conservancy and the big data service were studied. First, the acquisition of public data was studied. Computers were used to quickly and efficiently collect data into libraries, which greatly reduce the difficulty of data acquisition. Then, the method of data cleaning was determined to improve data quality and enhance the effectiveness and reliability of the data in the application process. Finally, the water conservancy prediction model was applied to the flood prevention decision-making service system based on the integrated platform. The results showed that the acquisition of public data greatly improved the efficiency of data acquisition. By cleaning the obtained data of repeated values, error values, outliers and missing values, higher quality water situation data was obtained. The water conservancy prediction model improved the accuracy of the prediction, and the flood control decision service system provided an efficient and operational integrated platform. Therefore, the water conservancy prediction model has a certain guiding role in flood control decision-making. It is the key to big data services for water conservancy.
为体现数据开发的应用价值,以多数据源数据为基础,对水利和大数据服务进行了研究。首先,对公共数据的获取进行了研究。利用计算机快速高效地将数据录入图书馆,大大降低了数据采集的难度。然后确定数据清洗的方法,以提高数据质量,增强数据在应用过程中的有效性和可靠性。最后,将该水利预测模型应用于基于综合平台的防洪决策服务系统。结果表明,公共数据的采集大大提高了数据采集的效率。通过对所得数据的重复值、误差值、离群值和缺失值进行清洗,得到质量较高的水情数据。水利预测模型提高了预测精度,防洪决策服务系统提供了一个高效、可操作的综合平台。因此,水利预测模型对防洪决策具有一定的指导作用。是水利大数据服务的关键。
{"title":"Water Conservancy Data Acquisition and Big Data Service Based on Multi-data Sources","authors":"Xu Zhu","doi":"10.23977/JEIS.2019.41001","DOIUrl":"https://doi.org/10.23977/JEIS.2019.41001","url":null,"abstract":"To reflect the application value of data development, based on the data of multiple data sources, the water conservancy and the big data service were studied. First, the acquisition of public data was studied. Computers were used to quickly and efficiently collect data into libraries, which greatly reduce the difficulty of data acquisition. Then, the method of data cleaning was determined to improve data quality and enhance the effectiveness and reliability of the data in the application process. Finally, the water conservancy prediction model was applied to the flood prevention decision-making service system based on the integrated platform. The results showed that the acquisition of public data greatly improved the efficiency of data acquisition. By cleaning the obtained data of repeated values, error values, outliers and missing values, higher quality water situation data was obtained. The water conservancy prediction model improved the accuracy of the prediction, and the flood control decision service system provided an efficient and operational integrated platform. Therefore, the water conservancy prediction model has a certain guiding role in flood control decision-making. It is the key to big data services for water conservancy.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43946801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Computer Network Security and Prevention Technology 计算机网络安全与防范技术分析
Pub Date : 1900-01-01 DOI: 10.23977/jeis.2023.080204
Shuai Yang, Xianfang Wang
: This paper mainly studies computer network security and firewall technology, discussing the functions, main technologies, configurations, security measures, and firewall design ideas of network firewall security technology. With the popularization of computer networks, network security issues are receiving increasing attention from people. We can propose corresponding measures to address the shortcomings and vulnerabilities in current network security and firewall settings, in order to expect our network to be more secure. In terms of ensuring network security and data security, there are data encryption technology, smart card technology, firewall technology, etc. We mainly study firewall technology here. Firewalls can be divided into various types based on their different methods, precautions, and priorities. Afterwards, two basic implementation technologies, firewall packet filtering and application proxy, were introduced. Firewall technology is still in the development stage, and there are still many problems that need to be solved.
本文主要研究计算机网络安全和防火墙技术,讨论了网络防火墙安全技术的功能、主要技术、配置、安全措施以及防火墙的设计思想。随着计算机网络的普及,网络安全问题越来越受到人们的重视。我们可以针对当前网络安全和防火墙设置中的不足和漏洞,提出相应的措施,以期望我们的网络更加安全。在保障网络安全和数据安全方面,有数据加密技术、智能卡技术、防火墙技术等。我们主要研究防火墙技术。根据防火墙的使用方法、注意事项和优先级的不同,防火墙可以分为不同的类型。然后介绍了防火墙包过滤和应用代理两种基本实现技术。防火墙技术还处于发展阶段,还有很多问题需要解决。
{"title":"Analysis of Computer Network Security and Prevention Technology","authors":"Shuai Yang, Xianfang Wang","doi":"10.23977/jeis.2023.080204","DOIUrl":"https://doi.org/10.23977/jeis.2023.080204","url":null,"abstract":": This paper mainly studies computer network security and firewall technology, discussing the functions, main technologies, configurations, security measures, and firewall design ideas of network firewall security technology. With the popularization of computer networks, network security issues are receiving increasing attention from people. We can propose corresponding measures to address the shortcomings and vulnerabilities in current network security and firewall settings, in order to expect our network to be more secure. In terms of ensuring network security and data security, there are data encryption technology, smart card technology, firewall technology, etc. We mainly study firewall technology here. Firewalls can be divided into various types based on their different methods, precautions, and priorities. Afterwards, two basic implementation technologies, firewall packet filtering and application proxy, were introduced. Firewall technology is still in the development stage, and there are still many problems that need to be solved.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Electronics and Information Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1