期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Building Intrusion Tolerant Software System 被引量:3
1
作者 PENGWen-ling wangli-na +1 位作者 ZHANGHuan-guo CHENWei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期47-50,共4页
In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inher... In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inherent security vulnerabilities. Wepresent someintrusion tolerance technology by exploiting N-version module threshold method in constructingmultilevel secure software architecture, by detecting with hash value, by placing an 'antigen' wordnext to the return address on the stack thatis similar to human immune system, and by adding 'Honeycode' nonfunctional code to disturb intruder, so that the security and the availability of thesoftware system are ensured. 展开更多
关键词 intrusion tolerant immune code Honey code trusted computing
下载PDF
An Improved Non-Repudiation Protocol and Its Security Analysis 被引量:1
2
作者 LiLi ZhangHuan-guo wangli-na 《Wuhan University Journal of Natural Sciences》 CAS 2004年第3期288-292,共5页
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using t... This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol. 展开更多
关键词 non-repudiation protocol extended Kailar logic converse assumption procedure
下载PDF
Wavelet-Based Denoising Attack on Image Watermarking
3
作者 XUANJian-hui wangli-na ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期279-283,共5页
In this paper, we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain ordiscrete wavelet transform (DWT) domain Wiener fil... In this paper, we propose wavelet-based denois-ing attack methods on imagewatermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain ordiscrete wavelet transform (DWT) domain Wiener filtering based on wavelet transform is performed inapproximation subband to remove DCI or DFT domain watermark, and adaptive wavelet soft thresholdingis employed to remove the watermark resided in detail subbands of DWT domain. 展开更多
关键词 WATERMARKING watermarking attack wavelet dcnoising Wiener filter
下载PDF
Quick Trickle Permutation Based on Quick Trickle Characteristic Sequence
4
作者 wangli-na FeiRu-chun LiuZhu 《Wuhan University Journal of Natural Sciences》 CAS 2003年第04A期1065-1069,共5页
The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the mapping relationship between quick trickle characteristic sequen... The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the mapping relationship between quick trickle characteristic sequence and quick trickle permutation is discussed. Finally, an efficient construction of quick trickle permutation based on quick trickle characteristic sequence is given, by which quick trickle permutation can be figured out after constructing quick trickle characteristic sequence. Quick trickle permutation has good cryptographic properties. 展开更多
关键词 quick trickle characteristic sequence quick trickle characteristic mapping quick trickle permutation
下载PDF
曲美他嗪联合阿托伐他汀治疗慢性稳定性冠心病效果分析
5
作者 王奎伟 舒琴 +5 位作者 李元媛 杨宝宝 张松亮 张璿 王莉娜 朱平平 《智慧健康》 2019年第18期106-107,共2页
目的探讨曲美他嗪联合阿托伐他汀治疗慢性稳定性冠心病效果分析。方法将2017年6月至2018年6月在我院心内科治疗的120例慢性稳定性冠心病患者随机分为两组,对照组单用曲美他嗪治疗,观察组使用曲美他嗪联合阿托伐他汀治疗,比较两组患者的... 目的探讨曲美他嗪联合阿托伐他汀治疗慢性稳定性冠心病效果分析。方法将2017年6月至2018年6月在我院心内科治疗的120例慢性稳定性冠心病患者随机分为两组,对照组单用曲美他嗪治疗,观察组使用曲美他嗪联合阿托伐他汀治疗,比较两组患者的临床疗效、炎性因子水平变化、血液流变学指标变化。结果观察组治疗有效率为95%,明显高于对照组的80%(P<0.05);IL-6、hs-CRP、TNF-α等炎性因子治疗后的水平比较,观察组明显低于对照组(P<0.05);观察组治疗后PV、HWBV、EAI、HCT明显低于对照组(P<0.05)。结论曲美他嗪联合阿托伐他汀治疗慢性稳定性冠心病效果显著,能有效改善血液黏稠度,抑制炎症反应,有效稳定病情,具有积极的临床意义。 展开更多
关键词 慢性稳定性冠心病 曲美他嗪 阿托伐他汀 效果分析
下载PDF
Effect of Prokinetics Combined with Proton Pump Inhibitors on Extraesophageal Symptoms of Reflux Esophagitis
6
作者 JiangHua wangli-na 《胃肠病学》 2000年第B08期150-150,共1页
关键词 质子泵 抑制剂 食道外症状 食道炎 PKS PPIS
全文增补中
Analysis of Endoscopic and Pathological Features for 53 Cases of Peptic Ulcer Accompanied with Gastric Cancer
7
作者 JiangHua wangli-na 《胃肠病学》 2000年第B08期92-92,共1页
关键词 内窥镜 病理学 消化性溃疡 胃癌 消化系统 肿瘤
全文增补中
上一页 1 下一页 到第
使用帮助 返回顶部