Fairness is of crucial importance for the exchange protocols via Internet . Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This pa...
详细信息
Fairness is of crucial importance for the exchange protocols via Internet . Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols : Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).
Two improvements are introduced into vicinal-risk-minimization based support vector (SV) algorithm. Since the misclassified samples must be support vectors, a scheme for pruning hard-to-learn samples from the training...
详细信息
Two improvements are introduced into vicinal-risk-minimization based support vector (SV) algorithm. Since the misclassified samples must be support vectors, a scheme for pruning hard-to-learn samples from the training set based on support vectors is presented. The parameter's determination of Gaussian vicinal function is proposed to be modified, based on the maximum likelihood criterion. Preliminary experimental results show that the pruning scheme and improvement of the parameter's determination of vicinal function much improved vicinal SV algorithm's generality, and can outperform support vector machine (SVM) by about 0.5% in test accuracy.
We present a role-based access control (RBAC) model and a mobile agent system with the universal modeling language (UML), we use the RBAC to control the access of the agent to the source of the agent platform, and we ...
详细信息
We present a role-based access control (RBAC) model and a mobile agent system with the universal modeling language (UML), we use the RBAC to control the access of the agent to the source of the agent platform, and we give some conclusions.
Two open problems remain unsolved in the content based video retrieval area. Firstly, how to find useful information and express it by different features. Secondly, how to fuse the heterogeneous information together t...
详细信息
ISBN:
(纸本)0780388747
Two open problems remain unsolved in the content based video retrieval area. Firstly, how to find useful information and express it by different features. Secondly, how to fuse the heterogeneous information together to boost the retrieval performance beyond any single component. The paper presents two kinds of timing information and their use in concept detection in news video, and a novel non-linear information fusion method to combine timing cues with other information from different sources. Experiments on the TRECVID 2004 dataset show that timing cues can boost performance when combined with other information.
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o...
详细信息
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability of attackers. With the attention on the influence upon system, the intrusion is described by the capability of the attacker in this model. And the intrusion model is formalized by the definition of meta-attack. Then an approach to cluster the hyper-alerts into meta-attack using correlation-algorithm is presented. In the end, the method on modeling the intrusion by meta-attack is presented, and the proof of existence and uniqueness of the model constructed by this approach are given.
Nowadays privacy and anonymity have become an increasing requirement in wireless networks. However, current mobile peer-to-peer architectures have not taken into account anonymity, especially the mutual anonymity betw...
详细信息
ISBN:
(纸本)0769523285
Nowadays privacy and anonymity have become an increasing requirement in wireless networks. However, current mobile peer-to-peer architectures have not taken into account anonymity, especially the mutual anonymity between two nodes. In this paper, we propose a mutual anonymity protocol, called secret-sharing-based mutual anonymity protocol (SMA), for mobile P2P networks. Our simulation results show that SMA achieves mutual anonymity in mobile P2P networks with a low cryptography processing overhead.
The rapid development of E-business and network management has been promoting the broad applications on multi-mobile agents system. However, it made routing security management of this system more complex and flexible...
详细信息
The rapid development of E-business and network management has been promoting the broad applications on multi-mobile agents system. However, it made routing security management of this system more complex and flexible. Aimed at multi-mobile agents system, this paper proposes a new scheme of routing security management. Based on the idea of Guard Agent (Proxy Agent) whose responsibility is protecting Task Agent, this scheme introduces Trust Mechanism and Verification Server and modifies the structure of traditional routing tables. It makes full use of the advantages of multi-mobile agents' cooperation and interaction, improves the safety and efficiency of routing and ensures optimization.
Introduction: The production of biological information has become much greater than its consumption. The key issue now is how to organise and manage the huge amount of novel information to facilitate access to this us...
详细信息
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, w...
详细信息
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, which are different from that of ordinary architecture, are highlighted firstly, and then a solution for extending Darwin is presented. Using the extended Darwin, service components and connectors can be described explicit by the extended construct, as well as precise operational semantics of SOA by the π-calculus. Finally an example of supply-chain management system is given for manifesting the effect of the extended Darwin.
A dynamic multi-secrets sharing threshold scheme is presented to apply to a large scale electronic voting system with many talliers (tallying authorities). Even if there exists adaptive adversaries, this scheme can gu...
详细信息
A dynamic multi-secrets sharing threshold scheme is presented to apply to a large scale electronic voting system with many talliers (tallying authorities). Even if there exists adaptive adversaries, this scheme can guard the ballot's producing, encrypting, transmitting, decrypting and final tallying in spite of the adversaries's attack, so the scheme guarantees robustness. In this paper, the verifiability of the voters' qualification and talliers' identification will be solved by a dynamic multi-secret sharing scheme without invoking more zero knowledge proof to maintain privacy, universal verifiability, and anonymity of ballots. It holds more communication efficiency and more security than the proposed schemes in early time.
暂无评论