An Improved Encryption Algorithm in the Virtual Machine Migration

来源 :第十七届全国青年通信学术年会、2012全国物联网与信息安全学术年会 | 被引量 : 0次 | 上传用户:tjunu520
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Virtual machine in the migration process is inevitable attack or cracked,so the virtual machine migration,in order to safety,must take safety measures of relevant documents.LZW is a compression algorithm,in character coding,image compression,etc in a wide range of applications.In this paper on the basis of LZW,and put forward a kind of encryption algorithm,used in the virtual machine of the migration process file encryption.The experimental results show that the algorithm has very good encryption effect,and can meet the demand encryption.
其他文献
A new approach to adaptive beamforming with nulling broadens and sidelobe control is developed.The proposed beamformer represents a modification of the popular minimum variance distortionless response
Session mobility in the next generation network supports the smooth switching of the terminal equipments in use without interrupting the current session,which combines the mobility of mobile equipment
We demonstrate a distributed nonlinearity compensation technique for 10.7 Gb/s coherent optical OFDM signals after 1000 km transmission.Over 2dB Q improvement has been observed after two-step compensa
Drive test()has been extensively used in GSM and 3G networks to investigate the network performance.However,it leads to high network maintenance cost and emission of CO2.Besides,it is not able to prov
The Forwarding and Control Element Separation (ForCES) is designed to standardize the information exchange between the control and forwarding plane.This physical separation allows component vendors to
Next Generation Broadcasting Network (NGB) is the evolution of current broadcasting system.Designed with innovative network architecture,NGB is aiming at providing people with all round services at a
A framework of quantum secret sharing (QSS) is proposed on the basis of the Chinese Remainder Theorem (CRT) with nonmaximally entanglement qubit pairs.In the present scheme,the secret is divided and a
This paper introduces a domestic SM2 coprocessor and the improved modular inverse module in it.The first part is a brief description of the SM2 coprocessor.Then there is a concisely introduction of th
Structural health monitoring (SHM) for bridges is a way of monitoring the status of a bridge to detect damage.Most of SHM systems proposed are based on WSN using acceleration measurements.But some imp
The paper introduces a control system based on GSM short message and its operating principle.Then the paper makes a comparison between this control system and the traditional control system,stating th
会议