ID 原文 译文
19845 用户可将生成的授权信息和陷门信息分别发送给云过滤服务器和云搜索服务器,在不解密密文的情况下,云过滤服务器可对所有密文进行检测。 The users send the authorizationinformation to the cloud filter server at once, then the server creates the authorization information; The cloudsearch server creates the trapdoor information based on the trapdoor information sent by the users.
19846 该方案利用多个属性授权机构,在保证数据机密性的前提下能进行高效的细粒度访问,解决数据用户密钥泄露问题,提高数据用户对云端数据的检索效率。 Withoutdecrypting the cipher text, the cloud filter server can detect all the cipher texts. Multiple attribute authoritiescan be used to ensure efficient and fine-grained access under the premise of ensuring data confidentiality,solving the problem of leakage of data user keys.
19847 通过安全性分析,证明方案在提供数据检索服务的同时无法窃取数据用户的敏感信息,且能够有效地防止数据隐私的泄露。 It can improve the data retrieval efficiency when people usethe cloud server. Through security analysis, it is proved that the scheme can not steal sensitive information ofdata users while providing data retrieval services, and it can effectively prevent the leakage of data privacy.
19848 该文首先利用属性攻击图理论构建了网络动态威胁分析属性攻击图(DT-AAG)模型,该模型在全面刻画系统漏洞和网络服务导致的威胁转移关系的基础上,结合通用漏洞评分标准(CVSS)和贝叶斯概率转移计算方法设计了威胁转移概率度量算法; Firstly, a network Dynamic Threat Attribute Attack Graph (DT-AAG) analysis model is constructedby using Attribute Attack Graph theory. On the basis of the comprehensive description of system vulnerabilityand network service-induced threat transfer relationship, a threat transfer probability measurement algorithm isdesigned in combination with Common Vulerability Scoring System (CVSS) vulnerability evaluation criteriaand Bayesian probability transfer method.
19849 其次基于构建的DT-AAG模型,利用威胁与漏洞、服务间的关联关系,设计了动态威胁属性攻击图生成算法(DT-AAG-A),并针对生成的属性攻击图存在的威胁传递环路问题,设计了环路消解机制; Secondly, based on the model, a Dynamic Threat Attribute AttackGraph generation Algorithm (DT-AAG-A) is designed by using the relationship between the threat and the vulnerability as well as the service. What’s more, to solve the problem that threat transfer loop existing in the generated attribute attack graph, the loop digestion mechanism is designed.
19850 最后通过实验验证了该模型和算法的有效性。 Finally, the effectiveness of theproposed model and algorithm is verified by experiments.
19851 为提高双极化卫星通信的安全传输性能,该文提出一种基于双层多参数加权类分数阶傅里叶变换(DL-MPWFRFT)的安全传输方法。 In order to improve the secure transmission performance of dual-polarized satellite communication, a secure transmission method based on Double Layer Multi-Parameter Weighted-type FR actional Fourier Transform (DL-MPWFRFT) is proposed.
19852 该方法中对相互正交的两路极化状态-幅相联合调制信号进行DL-MPWFRFT变换处理,并通过数模转换和射频化处理上载到卫星信道中。 Two orthogonally polarization amplitude-phase modulation branch signals are processed by DL-MPWFRFT, and then uploaded to the satellite channel by digital-to-analog conversion and radio frequency processing.
19853 仿真结果表明,该方法使传输信号的星座图发生旋转和扩散,抗扫描能力提高,在增加系统容量的同时增强了系统的抗截获性。 The simulation results show that the method rotates and spreads the constellation of the transmitted signal, improves the anti-scanning capability, and increases the anti-interception performance of the system meanwhile increasing the system capacity.
19854 相关滤波(CF)方法应用于视觉跟踪领域中效果显著,但是由于边界效应的影响,导致跟踪效果受到限制,针对这一问题,该文提出一种基于样本质量估计的正则化自适应的相关滤波视觉跟踪算法。 Correlation Filters (CF) are efficient in visual tracking, but their performance is badly affected by boundary effects. Focusing on this problem, the adaptive regularized correlation filters for visual tracking based on sample quality estimation are proposed.