Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements w...
详细信息
With the development of information technology and the popularity of smart devices, voice recognition system, which is installed in many devices such as smartphones and automatic control equipment, is playing an incre...
详细信息
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large,...
详细信息
The diminished accuracy of port-based and payload-based classification motivates use of transport layer statistics for network traffic classification. A semi-supervised clustering approach based on improved K-Means cl...
详细信息
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca...
详细信息
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step *** implementation of this protocol is also discussed.
Four types of variable-rate convolutional network codes are investigated over a single-source finite cyclic network. It is found that variable-rate generic, dispersion and broadcast can be implemented on the same netw...
详细信息
Four types of variable-rate convolutional network codes are investigated over a single-source finite cyclic network. It is found that variable-rate generic, dispersion and broadcast can be implemented on the same network without changing the local encoding kernels of the non-source nodes. The efficient implementation has the advantage that each non-source node only needs to store one copy of the local encoding kernel within a session. However, it is also shown by an example that variable-rate multicast may not always be implemented under the above condition.
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism...
详细信息
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism: multi-signcryption to routing protocol for ad hoc networks. SL multi-signcryption scheme efficiently provides message flexibility, order flexibility, message verifiability, order verifiability, message confidentiality, message unforgeability, non-repudiation and robustness. It is suitable for protecting messages and multi-signers from malicious attacks in networks. For this reason, using SL multi-signcryption, we propose a new secure AODV (Ad hoc on-demand distance vecter) routing protocol: SCRP (Signcryption based routing protocol). SCRP indeed enhances the security of AODV routing protocol and provides confidentiality, integrity, authentication, and non-repudiation to the routing message. Moreover, compared with other secure AODV, SCRP provides some other advantages such as lower computational cost and communicational overhead, flexibility of route message, and partially anonymous route.
Intelligent reflecting surfaces(IRSs)constitute passive devices,which are capable of adjusting the phase shifts of their reflected signals,and hence they are suitable for passive *** this paper,we conceive their desig...
详细信息
Intelligent reflecting surfaces(IRSs)constitute passive devices,which are capable of adjusting the phase shifts of their reflected signals,and hence they are suitable for passive *** this paper,we conceive their design with the active beamforming action of multiple-input multipleoutput(MIMO)systems used at the access points(APs)for improving the beamforming gain,where both the APs and users are equipped with multiple ***,we decouple the optimization problem and design the active beamforming for a given IRS *** we transform the optimization problem of the IRS-based passive beamforming design into a tractable non-convex quadratically constrained quadratic program(QCQP).For solving the transformed problem,we give an approximate solution based on the technique of widely used semidefinite relaxation(SDR).We also propose a low-complexity iterative *** further prove that it can converge to a locally optimal ***,considering the practical scenario of discrete phase shifts at the IRS,we give the quantization design for IRS elements on basis of the two *** simulation results demonstrate the superiority of the proposed solutions over the relevant benchmarks.
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...
详细信息
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of networksecurity. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and...
详细信息
暂无评论