Welcome![Sign In][Sign Up]
Location:
Search - Identity Based Encryption

Search list

[assembly language从BIOS控制计算机安全

Description: 纵观市场上的安全产品,从网络防火墙到各种网络加密、个人数字签证以及早期硬盘锁,均未能对个人计算机本身进行实质性的保护。这些安全机制大都基于这样一种原理:利用一个软件,输入一个特定的密码,经过验证后即可获得合法身份,从而实现各种操作,如购物、收发公文、浏览甚至修改机密数据。众所周知,这种基于纯密码的机制是很脆弱的,所以,许多关键行业和部门都采用了软、硬结合的方式,如设立各种Smart卡认证机制。在银行工作的职工,每人都有一张代表自己电子身份的IC卡,每天上班,必须先刷卡才能进入银行的业务系统。这种机制的安全性大大提高了,但对于个人或普通企业用计算机,这种机制成本太高。本文从BIOS工作原理出发,提出一种安全性高、全新的计算机安全保护机制。 -Taking a panoramic view on the market safe products, from network firewall to various networks encryption, visa and personal digital locks early drives have failed to personal computer itself substantive protection. Most of these security mechanisms based on a principle : the use of a software, input a specific password, once validated receive legal status, thereby realizing a variety of actions, such as shopping, send correspondence, View or even confidential data. As we all know, such a pure password mechanism is very fragile, so many key industries and departments have adopted a soft, a combination of hardware, such as the establishment of the Smart Card authentication mechanism. The bank workers, everybody will have a representative of their electronic identity IC card to work everyday
Platform: | Size: 2552 | Author: zy | Hits:

[Crack Hack200653023417608

Description: 基于U盘的身份认证 现在市场上出现各种各样的基于硬件的加密设备,但应用于身份认证的还很少,大部分应用在软件产品的加密方面。 软件开发商在开发软件特别是行业软件时经常用到身份验证,传统当方式是采用用户名+密码的方式进行认证,这样的验证方式存在很多缺点主要表现在以下两个方面: 1. 用户信息容易泄密 2. 用户信息容易遗忘 3. 给领导使用带来不便 作为软件开发商为了提高软件的可用性、加载身份认证功能。但需要从市场上加密厂商手中购买身份认证设备,但存在以下弊端: 1. 增加软件的成本 2. 每一个用户需要一套,当系统用户较多时产生较高的成本 3. 设备内部的核心技术不了解,增加了软件推广应用中的风险 4. 身份认证设备功能单一 -U disk-based identity authentication on the market now is a wide range of hardware-based encryption equipment, But for identity authentication also minimal, most application software products in the area of encryption. Software developers in the development of the software industry in particular is often used in the software authentication, When the traditional way is the user name + password authentication methods, This certification means there are many major flaws in the following two aspects : 1. User information easily leaks 2. User information easily forgotten 3. Leading to the use of inconvenience as software developers to improve software usability, loading authentication function. But needs from the market and buy encryption manufacturers authentication equipment, but the followin
Platform: | Size: 101867 | Author: 力封 | Hits:

[Crack Hackibe-0.7.2

Description: The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, \"Identity-Based Encryption from the Weil Pairing\", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, \"Authenticated Identity-Based Encryption\", available on eprint.
Platform: | Size: 98261 | Author: 高超 | Hits:

[Crack Hack200653023417608

Description: 基于U盘的身份认证 现在市场上出现各种各样的基于硬件的加密设备,但应用于身份认证的还很少,大部分应用在软件产品的加密方面。 软件开发商在开发软件特别是行业软件时经常用到身份验证,传统当方式是采用用户名+密码的方式进行认证,这样的验证方式存在很多缺点主要表现在以下两个方面: 1. 用户信息容易泄密 2. 用户信息容易遗忘 3. 给领导使用带来不便 作为软件开发商为了提高软件的可用性、加载身份认证功能。但需要从市场上加密厂商手中购买身份认证设备,但存在以下弊端: 1. 增加软件的成本 2. 每一个用户需要一套,当系统用户较多时产生较高的成本 3. 设备内部的核心技术不了解,增加了软件推广应用中的风险 4. 身份认证设备功能单一 -U disk-based identity authentication on the market now is a wide range of hardware-based encryption equipment, But for identity authentication also minimal, most application software products in the area of encryption. Software developers in the development of the software industry in particular is often used in the software authentication, When the traditional way is the user name+ password authentication methods, This certification means there are many major flaws in the following two aspects : 1. User information easily leaks 2. User information easily forgotten 3. Leading to the use of inconvenience as software developers to improve software usability, loading authentication function. But needs from the market and buy encryption manufacturers authentication equipment, but the followin
Platform: | Size: 101376 | Author: 力封 | Hits:

[Crack Hackpbc-0.4.9.tar

Description: 这是一个C的源代码,用来实现基于身份的加密算法-This is a C source code, used for identity-based encryption algorithm
Platform: | Size: 487424 | Author: 李秀 | Hits:

[Crack Hackibe-0.7.2

Description: The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
Platform: | Size: 98304 | Author: 高超 | Hits:

[JSPjava

Description: 本书以大量精简的实例介绍了Java安全性编程方面的概念和技术,全书共计9章。 经过精心设计,每个小节的实例着重说明一个问题,又相互贯穿和联系。涉及Java加密和解密,反编译和反反编译,对类、成员变量、方法的攻击和保护,消息摘要,消息验证码,数字签名,口令保护,数字证书和证书链的生成、签发、检验和维护,SSL和HTTPS客户及服务器程序、基于代码位置和签发者的授权,签名Java Applet,基于身份的验证和授权(JAAS)等。 全书的实例极为精简,只保留了能够说明问题的代码,而又可真正运行,便于Java入门者轻松掌握安全性方面繁杂的概念。适合于适合于初步了解Java语法的学习者,也适合于安全技术的入门及高校Java教学参考。 -This book introducte the Java security programming concepts and techniques by a large number of examples ,book total of 9 chapters. Carefully designed, each section highlights examples of a problem, and contact each other throughout. Involving Java encryption and decryption, decompile and compile counter of class, member variables, methods of attack and protection, message digest, message authentication codes, digital signatures, password protection, digital certificate and certificate chain generation, issuance, inspection and maintenance, SSL and HTTPS clients and server program, based on code location and issuer of the authorized signature Java Applet, identity-based authentication and authorization (JAAS) and so on. Examples of the book is extremely streamlined, leaving only the problem that can code and who can really run, easy to Java beginners to easily grasp complex security concepts.
Platform: | Size: 2375680 | Author: wang chao | Hits:

[Crack Hackibe.tar

Description: IBE加密算法的入门文章Identity-Based Encryption from the Weil Pairing-IBE encryption algorithm of the article Introduction to Identity-Based Encryption from the Weil Pairing
Platform: | Size: 264192 | Author: pandora | Hits:

[Windows DevelopIBEmiracl

Description: Windows环境下可调试的一个IBE算法,包括Setup、Extract、Encrypt和Decpty过程。对于设计基于身份的电子邮箱、加密系统等具有较高的应用价值。-Windows environment can be an IBE algorithm debugging, including Setup, Extract, Encrypt and Decpty process. For the design of e-mail identity-based encryption system has a high application value.
Platform: | Size: 727040 | Author: beyond | Hits:

[Crack HackIbe_dec

Description: IBE基于身份的加密系统的解密程序,使用VC6.0开发-IBE identity-based encryption system of the decryption process, using VC6.0 Development
Platform: | Size: 1475584 | Author: guoshaolong | Hits:

[Crack HackIbe_enc

Description: IBE基于身份的加密系统的加密程序,使用VC6.0开发-IBE identity-based encryption system of the decryption process, using VC6.0 Development
Platform: | Size: 1643520 | Author: guoshaolong | Hits:

[Crack HackIbe_ext

Description: IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点-IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve
Platform: | Size: 1472512 | Author: guoshaolong | Hits:

[Crack HackIbe_set

Description: IBE基于身份的加密系统的系统叁数程序,使用VC6.0开发-IBE identity-based encryption system of systems Triple the number of procedures, the use of VC6.0 Development
Platform: | Size: 1406976 | Author: guoshaolong | Hits:

[OtherIdentityBasedEncryption_SB-121108

Description: Identity based encryption basic idea.. a very good read. highly recommended
Platform: | Size: 144384 | Author: vikhyath_4u | Hits:

[Crack Hackibe1

Description: 基于身份的加密,集中式身份基加密 源文件 基于miracl数据库的基础-Identity-based encryption, centralized identity-based encryption
Platform: | Size: 40702976 | Author: ju | Hits:

[Crack HackIBE

Description: 基于身份的IBE加密方案,用用户的身份作为私钥-Identity-based IBE encryption scheme, the user s identity as a private key
Platform: | Size: 99328 | Author: 黄丽洁 | Hits:

[CA auth927a0b3738ea

Description: 基于身份加密程序,对于IBE学习的人来说是个不错的初学小程序。-Identity-based encryption program
Platform: | Size: 1514496 | Author: 刘云 | Hits:

[Program docPAPER4

Description: 基于理想格的高效模糊身份加密方案.pdf-Ideal lattice based encryption scheme effective fuzzy identity
Platform: | Size: 386048 | Author: wang | Hits:

[Energy industryCryptographyClustering

Description: Energy cost of transmitting a single bit of information is approximately the same as that needed for processing a thousand operations in a typical sensor node. Thus, a practical way to prolong a wireless sensor network lifetime is to reduce the sensor energy consumption in data transmissions. Data aggregation is an efficient way to minimize energy consumption on sensors. In this paper, we propose a practical secure data aggregation scheme, Sen-SDA, based on an additive homomorphic encryption scheme, an identity-based signature scheme, and a batch verification technique with an algorithm for filtering injected false data.
Platform: | Size: 10289152 | Author: Pooja | Hits:

[CA authfenc-0.2.0.tar

Description: 基于属性加密(ABE),又称模糊的基于身份的加密(Fuzzy Identity-Based Encryption)。它把身份标识被看做是一系列的属性。IBE中解密者,只有当自己的身份信息和信息加密者描述的信息是一致的时候,才可以解密加密者加密的信息。和IBE不同的是,采用基于属性加密后,当用户拥有的属性超过加密者所描述的预设门槛时,用户是可以解密的。但这种基于预设门槛的方案不具有通用性。因为在语义上无法表述一个普遍通用的情景。- U5C5E u6027 u57FA u52A0 u5BC6
Platform: | Size: 449536 | Author: 赵文 | Hits:
« 12 »

CodeBus www.codebus.net