A new construction of the anonymous identity-based encryption is proposed. The new scheme has the exciting features over the availables, such as short public keys and private keys, constant size ciphertexts and low co...
详细信息
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing...
详细信息
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing platform, as well as the service efficiency on such computing platform. At the same time, according to our knowledge, the design theory of the trusted virtual computing environment and its core system software for such network-based computing platform is at the exploratory stage. In this paper, we believe that efficiency and isolation are the two key proprieties of the trusted virtual computing environment. To guarantee these two proprieties, based on the design principle of splitting, customizing, reconstructing, and isolation-based enhancing to the platform, we introduce TRainbow, a novel trusted virtual computing platform developing by our research *** the two creative mechanisms, that is, capacity flowing amongst VMs and VM-based kernel reconstructing, TRainbow provides great improvements (up to 42%) in service performance and isolated reliable computing environment for Internet-oriented, large-scale, concurrent services.
security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies...
详细信息
security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies to a large extent on the knowledge and length of experience of the experts. Therefore in this domain Case-Based Reasoning (CBR) is introduced for the security assessment of TPPs since this methodology models expertise through experience management. Taking the management system of TPPs as breakthrough point, this paper presents a case-based approach for the security assessment decision support of TPPs (SATPP). First, this paper reviews commonly used approaches for TPPs security assessment and the current general evaluation process of TPPs security assessment. Then a framework for the Management systemsecurity Assessment of Thermal Power Plants (MSSATPP) is constructed and an Intelligent Decision Support system for MSSATPP (IDSS-MSSATPP) is functionally designed. MSSATPP involves several key technologies and methods such as knowledge representation and case matching.
We propose a novel and simple all-optical 160-Gb/s orthogonal frequency division multiplexing(OFDM) symbol generator which is based on discrete triangle waveform driving-LiNbO_3 modulators to realize large-range lin...
详细信息
We propose a novel and simple all-optical 160-Gb/s orthogonal frequency division multiplexing(OFDM) symbol generator which is based on discrete triangle waveform driving-LiNbO_3 modulators to realize large-range linear optical *** entire system needs 64 discrete modulators:at the transmitter,a 2.5-Gb/s optical duobinary(ODB) modulator for data modulation and a 2.5-Gb/s triangle waveform driving-LiNbO_3 phase modulator for phase shift to generate each subcarrier;and at the receiver,a 2.5-GHz optical band pass filter(OBPF) using Faraday anomalous dispersion optical effect to separate *** bit error rate(BER) is observed after 1060 km of transmission without any dispersion compensation.
Network emulation environment is great importance to the research of network protocols, applications and security mechanism. Large-scale network topology generation is one of key technologies to construct network emul...
详细信息
The scene of surveillance video is usually wide and variable, and the target vehicles inside it are often small. Surveillance videos usually are not suitable for intelligent video applications, such as video vehicle d...
详细信息
As 3G networks provide enhanced capabilities of data transportation, a considerable amount of mobile applications and services, which involve mass of unstructured digital contents, e.g., video and audio, are available...
详细信息
The worm experimental environment is the pivotal foundation for the worm research. Existing methods to build the environment can be classified into three categories: mathematical modeling, simulation and emulation. Ho...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping strategy in real time, so as to reduce the probability of the system stepping into the attackers' target area. With the experiments proving the anti-attack ability of the prototype system, the feasibility and effectiveness of adaptive strategy were demonstrated for EH system.
IGES is a widely used standard for mechanical data exchange. In this paper, we present a new method for the retrieval task of IGES surface model. Based on this method, a novel distinctive face selection strategy is pr...
详细信息
暂无评论