Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement *** this mechanism a single user,whose attributes satisfy the predicate,endorses the *** signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the *** security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
Research on the certificate-less public key cryptography has been widely concerned recently. Identity-based cryptography, ***, is the most successful certificateless solution. It can employ an arbitrary ID of a user a...
详细信息
The vehicular mobility models have great significance and serious effect on simulation of Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models can be classified into synthetic mobility mod...
详细信息
ISBN:
(纸本)9781849192392
The vehicular mobility models have great significance and serious effect on simulation of Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models can be classified into synthetic mobility models. Though being widely applied, they do not properly reproduce complex urban traffic environment. To improving the vehicular mobility model's reality, this paper analyzed real-world vehicular trace and proposed Real Trace Vehicular Mobility Model with introducing of the traffic flow theory. This model incorporated resident area and more realistic speed rule. On this basis, the further analysis of the proximity of the model, the statistical characteristic and the network connection characteristic are given in this paper. The simulation results show that the proposed model can properly approximate the actual vehicular behaviour in urban traffic scenario.
The choice of the mobility models affect seriously the simulation results of the key technologies for Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models can be classified into synthetic ...
详细信息
In DTNs, links are rare. Making full use of every link shows great importance to routing protocols. Link Prediction (LP) can predict future links between two nodes. Plenty of algorithms for link prediction have been p...
详细信息
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware appro...
详细信息
ISBN:
(纸本)9781424473854
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware approach. By introducing the novel local-booting technology of our previous work called Secure Virtual Execution Environment, Libra VM just boots from the underlying host OS but not a newly installed OS image. Consequently, Libra accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM. In addition, with proposing a set of unique techniques to implicitly construct the trusted OS-level semantic view of resource from within the virtualized hardware layer, Libra is decoupled with the guest information which is subvertable to the privileged guest malware. Thus, Libra provides a promising way to detect the existing stealth malware in the host OS. We have implemented a prototype of Libra on Windows platforms and our evaluation results with real-world rootkits demonstrate the practicality and effectiveness of our approach.
The changes in dynamic workflows are various, such as role-based dynamic workflows, resource based dynamic workflows and so on. A routing-based dynamic workflow is proposed in this study and Agent technology is introd...
详细信息
This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the w...
详细信息
Through deeply analysis of INVITE flooding attack of SIP based VoIP system, a novel VoIP flooding detection scheme called CDVFD (Call Duration based VoIP Flooding Detection) is presented. The CDVFD method makes use of...
详细信息
暂无评论