您现在的位置: 首页> 研究主题> Proxy

Proxy

Proxy的相关文献在1995年到2022年内共计170篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、教育 等领域,其中期刊论文143篇、会议论文8篇、专利文献19篇;相关期刊110种,包括影视制作、通信世界、移动通信等; 相关会议6种,包括中国科学院计算技术研究所第八届计算机科学与技术研究生学术讨论会、全国第二届Java技术应用学术会议、中国计算机学会信息保密专业委员会年会等;Proxy的相关文献由277位作者贡献,包括Raja Sekhar Reddy Gade、Sanjeev Kumar、余丽等。

Proxy—发文量

期刊论文>

论文:143 占比:84.12%

会议论文>

论文:8 占比:4.71%

专利文献>

论文:19 占比:11.18%

总计:170篇

Proxy—发文趋势图

Proxy

-研究学者

  • Raja Sekhar Reddy Gade
  • Sanjeev Kumar
  • 余丽
  • 刘生
  • 吴双桥
  • 喻波
  • 姚震环
  • 安鹏
  • 张云飞
  • 张文涛
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

关键词

    • 摘要: 日前,索尼手持摄录一体机PXW-Z280V推出V5.0固件升级。升级包括:短片段Proxy文件(短片段代理文件)录制与上传、RTMP证书修改功能、可在Slow&Quick功能下拍摄录制HD 100fps/120fps升格素材、可解除Full Auto(全自动)按钮功能、拓展Proxy文件(代理文件)元数据记录、增强设备运行稳定性与安全性。此次升级在保持PXW-Z280V一贯的高品质、高可靠的基础上,进一步提高了摄像机产品的易用性与便利性,令广大广播电视行业机构和专业视频内容生产者能够在日常工作过程感受到更加高的效率。
    • Lei HE; Jianfeng MA; Limin SHEN; Dawei WEI
    • 摘要: Unmanned aerial vehicle(UAV)technologies have a promising application prospect.It is necessary to use digital signature schemes to protect the integrity and authentication of messages in the UAV networks.According to the characteristics of UAV networks,digital signature schemes should solve the problems of digital certificate management and key escrow,guarantee the real-time performance of UAV executing commands,and ensure that only the designated verifier can verify the signature.Therefore,we proposed a certificateless designated verifier proxy signature(CLDVPS)scheme which meets the requirements.We proved our signature scheme is existentially unforgeable under an adaptive chosen message attack in the random oracle model and compared the efficiency of our signature scheme with other signature schemes.We implemented these signature schemes in jPBC to obtain the computing time and theoretically analyzed signature length of these signature schemes.The analysis results indicate that our CLDVPS scheme is more efficient than most of other related signature schemes on computation costs and also efficient on communication costs.
    • 顾武雄1
    • 摘要: 在过去若想要防护远程连接Exchange Server的安全,必须集成ISA Server、TMG或是UAG之类的解决方案,而如今这一些方案直到2010年开始,便已经没有再推出新的版本,这对于新版本Exchange Server 2013系统的导入,如果想要部署高度安全性的远程访问架构该如何是好呢?别担心!本文作者将告诉您,如何使用绝佳的替代方案Web Application Proxy技术,来解决这项棘手的安全问题。
    • 徐小龙12; 张栖桐1; 周静岚2
    • 摘要: The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption (NC-MACPABE). NC-MACPABE optimizes the weighted access structure (WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users’ information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user’s access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
    • Asma Alotaibi; Ahmed Barnawi; Mohammed Buhari
    • 摘要: Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.
    • 薛鲍
    • 摘要: 6月12日,由科技处和科协主办,城市与环境学院承办的创新论坛第五十六讲在长安校区举行。中国科学技术大学地球和空间科学系耿雷教授为师生作了题为 Understanding tropospheric oxidant varia-bility over major climate transitions using ice-core proxy record and a global chemical - climate interaction model 的学术报告。城市与环境学院李同弄教授主持报告会。
    • 曾丽君; 魏丽; 闵芳
    • 摘要: 会话初始协议(SIP)是一种应用层控制协议,在IMS系统中应用广泛。研究了一种平台化SIP的实现方案,这种方案使得SIP在不同的产品中能屏蔽上层和底层的实现,通过提供不同的接口层给上层应用使用,使得SIP更具通用性。基于此种思路,进一步实现了SIP分层结构中非常重要的组成部分SIP TU的基本功能和关键技术,具体包括UAC、UAS以及proxy行为的支持等。
    • Raed Al-Qura’n; Ali Hadi; Jalal Atoum; Malek Al-Zewairi
    • 摘要: Anti-censorship applications are becoming increasingly popular mean to circumvent Internet censorship, whether imposed by governments seeking to control the flow of information available to their citizens, or by parental figures wishing to shield their “parishioners” from the dangers of the Internet, or in organizations trying to restrict the Internet usage within their networking territory. Numerous applications are readily accessible for the average user to aid-in bypassing Internet censorship. Several technologies and techniques are associated with the formation of these applications, whereas, each of these applications deploys its unique mechanism to circumvent Internet censorship. Using anti-censorship applications in the work environment can have a negative impact on the network, leading to excessive degradation in the bandwidth, immense consumption of the Internet data usage capacity and possibly open the door for security breaches. Triumphing the war on anti-censorship applications has become more difficult to achieve at the network level due to the rapid updates and the adopted new technologies to circumvent censorship. In this study, a comprehensive overview on Internet censorship and anti-censorship applications is provided by analyzing Ultrasurf behavior, classifying its traffic patterns and proposing a behavioral-based solution that is capable of detecting and preventing the Ultrasurf traffic at the network level.
    • Waleed Ali; Siti Mariyam Shamsuddin
    • 摘要: One of commonly used approach to enhance the Web performance is Web proxy caching technique. In Web proxy caching, Least-Frequently-Used-Dynamic-Aging (LFU-DA) is one of the common proxy cache replacement methods, which is widely used in Web proxy cache management. LFU-DA accomplishes a superior byte hit ratio compared to other Web proxy cache replacement algorithms. However, LFU-DA may suffer in hit ratio measure. Therefore, in this paper, LFU-DA is enhanced using popular supervised machine learning techniques such as a support vector machine (SVM), a naive Bayes classifier (NB) and a decision tree (C4.5). SVM, NB and C4.5 are trained from Web proxy logs files and then intelligently incorporated with LFU-DA to form Intelligent Dynamic- Aging (DA) approaches. The simulation results revealed that the proposed intelligent Dynamic- Aging approaches considerably improved the performances in terms of hit and byte hit ratio of the conventional LFU-DA on a range of real datasets.
    • 张忠林; 陈以; 黄小波
    • 摘要: 在分析了穿刺手术机器人系统功能需求的基础上,搭建了主从遥操作系统的半实物仿真平台.在主从控制的基础上,提出一个利用虚拟夹具VF (Virtual Fixture)算法结合Proxy的方法的主动约束控制策略.实验结果表明,系统能够在给定运动约束的情况下完成相应的主从控制.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号