With the increase in the internet technology, security of information is the essential requirement. Security protocols make use of the cryptographic techniques to achieve the security of information. True random numbe...
详细信息
ISBN:
(纸本)9781728193694
With the increase in the internet technology, security of information is the essential requirement. Security protocols make use of the cryptographic techniques to achieve the security of information. True random number generators (TRNG) are used as basic component in building cryptography. There is a demand for TRNG which generates random numbers. The random sequence generated must be statistical and non-predictable. This paper represents the design and implementation of statistical, non-predictable Hybrid TRNG. Chaotic oscillator designed using miller circuit is used as clock seed generator. Random seed generated at every clock is used as seed to Blum Blum Shub (bbs) algorithm which generates random sequence. The binary random sequence generated from simulation platform has passed all the test methods of NIST standard.
Nowadays, Web Services has become one of the hot issues in the area of computer sciences, that makes an ability to collect capabilities and components in a unique interface to fulfill the user's requirements. Some...
详细信息
Nowadays, Web Services has become one of the hot issues in the area of computer sciences, that makes an ability to collect capabilities and components in a unique interface to fulfill the user's requirements. Sometimes, two or more services can be found in available list of services;therefore, there should be a possibility for selecting the best services from discovered list which can satisfy the user's needs. The selected services should optimize the overall QoS of the composed application, while satisfying all the constraints specified by the consumer on individual QoS parameters. In this paper, we propose a contrast analysis between two Skyline algorithms and evaluate them experimentally. (C) 2018 The Authors. Published by Elsevier B.V.
The web service has widely spread in recent years which is showed by the large number of published web services. However, users may not always find their needs in one web service which has consequently spawned a compo...
详细信息
ISBN:
(纸本)9781728142166
The web service has widely spread in recent years which is showed by the large number of published web services. However, users may not always find their needs in one web service which has consequently spawned a composition of web services. This composition lead to many task difficulties including the selection of web services, which also consists of choosing the best QoS-based services among other similar services provided. From this perspective, there are several approaches to the selection of web services, however, this remains deficient at the level of execution time due to the rage number of competing web services. In this paper, we propose a new selection approach based on prefiltering and Skyline, this approach is tested and improved using a real dataset. We used two steps to solve this problem, prefiltering and Skyline. The first step is the use of K-Means clustering to bundle web services with similar Quality of Service (QoS) properties under one umbrella is explored. The second one is defining the most dominant web service using the Branch-and-Bound Skyline algorithm.
Nowadays, Vehicular ad hoc Network as a special class of Mobile ad hoc Network(MANET), provides plenty of services. However, it also brings the privacy protection issues, and there are conflicts between the privacy pr...
详细信息
ISBN:
(纸本)9781538631546
Nowadays, Vehicular ad hoc Network as a special class of Mobile ad hoc Network(MANET), provides plenty of services. However, it also brings the privacy protection issues, and there are conflicts between the privacy protection and the services. In this paper, we will propose a privacy protection algorithm based on group signature including two parts, group signature based anonymous verification and batch verification. The anonymous verification is based on the network model we proposed, which can reduce the trust authority burden by dividing the roadside units into different levels, and the batch verification can reduce the time of message verification in one group. We also prove our algorithm can satisfy the demand of privacy protection. Finally, the simulation shows that the algorithm we proposed is better than the bbs on the length of the signature, time delay and packet loss rate.
Nowadays, Web Services has become one of the hot issues in the area of computer sciences, that makes an ability to collect capabilities and components in a unique interface to fulfill the user’s requirements. Sometim...
详细信息
Nowadays, Web Services has become one of the hot issues in the area of computer sciences, that makes an ability to collect capabilities and components in a unique interface to fulfill the user’s requirements. Sometimes, two or more services can be found in available list of services; therefore, there should be a possibility for selecting the best services from discovered list which can satisfy the user’s needs. The selected services should optimize the overall QoS of the composed application, while satisfying all the constraints specified by the consumer on individual QoS parameters. In this paper, we propose a contrast analysis between two Skyline algorithms and evaluate them experimentally.
Due to high system capacity requirement, 3GPP Long Term Evolution (LTE) is likely to adopt frequency reuse factor 1 at the cost of suffering severe inter-cell interference (ICI). One of combating ICI strategies is net...
详细信息
ISBN:
(纸本)9781479944811
Due to high system capacity requirement, 3GPP Long Term Evolution (LTE) is likely to adopt frequency reuse factor 1 at the cost of suffering severe inter-cell interference (ICI). One of combating ICI strategies is network cooperation of resource allocation (RA). For LTE uplink RA, requiring all the subcarriers to be allocated adjacently complicates the RA problem greatly. This paper investigates the joint multi-cell RA problem for LTE uplink. We model the uplink RA and ICI mitigation problem using pure binary-integer programming (BIP), with integrative consideration of all users' channel state information (CSI). The advantage of the pure BIP model is that it can be solved by branch-and-bound search (bbs) algorithm or other BIP solving algorithms, rather than resorting to exhaustive search. The system-level simulation results show that it yields 14.83% and 22.13% gains over single-cell optimal RA in average spectrum efficiency and 5th percentile of user throughput, respectively.
暂无评论