Proxy
Proxy的相关文献在1995年到2022年内共计170篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、教育
等领域,其中期刊论文143篇、会议论文8篇、专利文献19篇;相关期刊110种,包括影视制作、通信世界、移动通信等;
相关会议6种,包括中国科学院计算技术研究所第八届计算机科学与技术研究生学术讨论会、全国第二届Java技术应用学术会议、中国计算机学会信息保密专业委员会年会等;Proxy的相关文献由277位作者贡献,包括Raja Sekhar Reddy Gade、Sanjeev Kumar、余丽等。
Proxy
-研究学者
- Raja Sekhar Reddy Gade
- Sanjeev Kumar
- 余丽
- 刘生
- 吴双桥
- 喻波
- 姚震环
- 安鹏
- 张云飞
- 张文涛
- 张玉波
- 张铮
- 张高旺
- 徐向东
- 戚国强
- 文刘飞
- 施广宇
- 曾毅
- 李娜
- 李宁
- 李小敏
- 李洋
- 李翔宇
- 李贺武
- 李超
- 李风华
- 林勇
- 柴文磊
- 江勇
- 王兴芬
- 王志海
- 罗峰
- 董爱华
- 蔡安
- 郑芳只
- 陈凯
- 陈春红
- 陈荣观
- 高宗敏
- 黄文浩
- 黄苏支
- 龙有水
- A. Ghaffari
- Adeniran Oluwaranti
- Ahmed Barnawi
- Ali Hadi
- Armin Beck
- Asma Alotaibi
- Ayodeji Oluwatope
- Chen-Tung Arthur Chen
-
-
-
-
摘要:
日前,索尼手持摄录一体机PXW-Z280V推出V5.0固件升级。升级包括:短片段Proxy文件(短片段代理文件)录制与上传、RTMP证书修改功能、可在Slow&Quick功能下拍摄录制HD 100fps/120fps升格素材、可解除Full Auto(全自动)按钮功能、拓展Proxy文件(代理文件)元数据记录、增强设备运行稳定性与安全性。此次升级在保持PXW-Z280V一贯的高品质、高可靠的基础上,进一步提高了摄像机产品的易用性与便利性,令广大广播电视行业机构和专业视频内容生产者能够在日常工作过程感受到更加高的效率。
-
-
Lei HE;
Jianfeng MA;
Limin SHEN;
Dawei WEI
-
-
摘要:
Unmanned aerial vehicle(UAV)technologies have a promising application prospect.It is necessary to use digital signature schemes to protect the integrity and authentication of messages in the UAV networks.According to the characteristics of UAV networks,digital signature schemes should solve the problems of digital certificate management and key escrow,guarantee the real-time performance of UAV executing commands,and ensure that only the designated verifier can verify the signature.Therefore,we proposed a certificateless designated verifier proxy signature(CLDVPS)scheme which meets the requirements.We proved our signature scheme is existentially unforgeable under an adaptive chosen message attack in the random oracle model and compared the efficiency of our signature scheme with other signature schemes.We implemented these signature schemes in jPBC to obtain the computing time and theoretically analyzed signature length of these signature schemes.The analysis results indicate that our CLDVPS scheme is more efficient than most of other related signature schemes on computation costs and also efficient on communication costs.
-
-
顾武雄1
-
-
摘要:
在过去若想要防护远程连接Exchange Server的安全,必须集成ISA Server、TMG或是UAG之类的解决方案,而如今这一些方案直到2010年开始,便已经没有再推出新的版本,这对于新版本Exchange Server 2013系统的导入,如果想要部署高度安全性的远程访问架构该如何是好呢?别担心!本文作者将告诉您,如何使用绝佳的替代方案Web Application Proxy技术,来解决这项棘手的安全问题。
-
-
徐小龙12;
张栖桐1;
周静岚2
-
-
摘要:
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption (NC-MACPABE). NC-MACPABE optimizes the weighted access structure (WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users’ information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user’s access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
-
-
Asma Alotaibi;
Ahmed Barnawi;
Mohammed Buhari
-
-
摘要:
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency.
-
-
-
-
Raed Al-Qura’n;
Ali Hadi;
Jalal Atoum;
Malek Al-Zewairi
-
-
摘要:
Anti-censorship applications are becoming increasingly popular mean to circumvent Internet censorship, whether imposed by governments seeking to control the flow of information available to their citizens, or by parental figures wishing to shield their “parishioners” from the dangers of the Internet, or in organizations trying to restrict the Internet usage within their networking territory. Numerous applications are readily accessible for the average user to aid-in bypassing Internet censorship. Several technologies and techniques are associated with the formation of these applications, whereas, each of these applications deploys its unique mechanism to circumvent Internet censorship. Using anti-censorship applications in the work environment can have a negative impact on the network, leading to excessive degradation in the bandwidth, immense consumption of the Internet data usage capacity and possibly open the door for security breaches. Triumphing the war on anti-censorship applications has become more difficult to achieve at the network level due to the rapid updates and the adopted new technologies to circumvent censorship. In this study, a comprehensive overview on Internet censorship and anti-censorship applications is provided by analyzing Ultrasurf behavior, classifying its traffic patterns and proposing a behavioral-based solution that is capable of detecting and preventing the Ultrasurf traffic at the network level.
-
-
Waleed Ali;
Siti Mariyam Shamsuddin
-
-
摘要:
One of commonly used approach to enhance the Web performance is Web proxy caching technique. In Web proxy caching, Least-Frequently-Used-Dynamic-Aging (LFU-DA) is one of the common proxy cache replacement methods, which is widely used in Web proxy cache management. LFU-DA accomplishes a superior byte hit ratio compared to other Web proxy cache replacement algorithms. However, LFU-DA may suffer in hit ratio measure. Therefore, in this paper, LFU-DA is enhanced using popular supervised machine learning techniques such as a support vector machine (SVM), a naive Bayes classifier (NB) and a decision tree (C4.5). SVM, NB and C4.5 are trained from Web proxy logs files and then intelligently incorporated with LFU-DA to form Intelligent Dynamic- Aging (DA) approaches. The simulation results revealed that the proposed intelligent Dynamic- Aging approaches considerably improved the performances in terms of hit and byte hit ratio of the conventional LFU-DA on a range of real datasets.
-
-
张忠林;
陈以;
黄小波
-
-
摘要:
在分析了穿刺手术机器人系统功能需求的基础上,搭建了主从遥操作系统的半实物仿真平台.在主从控制的基础上,提出一个利用虚拟夹具VF (Virtual Fixture)算法结合Proxy的方法的主动约束控制策略.实验结果表明,系统能够在给定运动约束的情况下完成相应的主从控制.
-
-
-
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-
-
李小敏;
陆以勤
- 《第九届全国青年通信学术会议》
| 2004年
-
摘要:
本文主要介绍了现有国际互联网、有线电视网、电信网下多媒体业务的模型,并分析它们各自的优缺点,并设想在未来统一的TINA平台下多媒体业务的模型.最后,文章提出视频点播业务(VOD)在TINA平台下的应用.
-