Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network...
详细信息
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network coding in the generalized combination network can be characterized by the network capacity and the min-cut bound of wiretapping set from the source. Furthermore, it can be extended to any directed acyclic networks with single source. Compared with the traditional results, we construct information-theoretic secure network coding without additional encryptions and giving up any capacity.
Fong et *** variable-rate linear network coding for linear ***,the authors didn't investigate it for the other three types of linear network *** this paper,by simple and clear proofs,it is found that there are sim...
详细信息
Fong et *** variable-rate linear network coding for linear ***,the authors didn't investigate it for the other three types of linear network *** this paper,by simple and clear proofs,it is found that there are similar results for variable-rate linear generic and linear dispersion if the field size is large *** means that linear generics and linear dispersions of different dimensions can be implemented on the same network,while each non-source node is required to store only one copy of the local encoding kernel within a ***,an example is given to show that there isn't a similar result for linear multicast.
The approach based on payload signatures presents more accurately than that using port number and machine learning algorithms in network traffic identification. The performance of payload-based approach heavily depend...
详细信息
Lots of security mechanisms have been applied in current information systems to assure the confidentiality and integrality for the information processed. These mechanisms are selected in accordance with the certain se...
详细信息
This paper presents a method using support vector machine with polyspectral kernels for classification of individual ***,the neighborhood-roughset-based weighted feature set is *** experiments of the algorithms mentio...
详细信息
This paper presents a method using support vector machine with polyspectral kernels for classification of individual ***,the neighborhood-roughset-based weighted feature set is *** experiments of the algorithms mentioned above indicate that they have consistency,which raises a new weighted *** experiment shows that better classification rate can be achieved.
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But securi...
详细信息
ISBN:
(纸本)9788955191455
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But security and trust have also become urgent problems for a P2P network due to its openness and anonymousness. Most of the current schemes rely on some trust models, but the research in systematic managing scheme is scarce. Consequently, we propose a scheme of constructing trust management systems in a P2P network here.
This paper proposes a novel method of using wavelet kernel functions in Support Vector Machines (SVMs), and this method is applied to identification of individual communication transmitter which works in frequency-hop...
详细信息
The concrete tripartite concurrent signature scheme designed by Susilo et aI. is found being unambiguity. In other words, any fourth party can identify who is the real signer of the publicly available valid signatures...
详细信息
MSU(Moscow State University) Stego Video is a public video steganographic tool. It uses a specific data distribution mode to load secret data, so that the message can be extracted correctly even the stego video are co...
详细信息
Third Generation (3G) wireless networks are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable th...
详细信息
暂无评论