The author proposes some DSA type secure interactive batch verification protocols, where the signer generates n signatures through interactions with the verifier, and the verifier validates all these n signatures.
The author proposes some DSA type secure interactive batch verification protocols, where the signer generates n signatures through interactions with the verifier, and the verifier validates all these n signatures.
After gathering sufficient shadows from honest participants and deriving the secret exclusively, a participant, in the process of reconstruction a secret, can turn dishonest and withhold his own shadow (or present a f...
详细信息
After gathering sufficient shadows from honest participants and deriving the secret exclusively, a participant, in the process of reconstruction a secret, can turn dishonest and withhold his own shadow (or present a fake shadow) so that others cannot obtain the secret. Previous solutions to overcome this cheating problem require all participants to release their shadows simultaneously;which is difficult to enforce without other supporting protocols. In this paper, we propose a secret reconstruction protocol to solve the cheating problem without the simultaneous release constraint. This protocol is unconditionally secure and can be incorporated with any secret sharing scheme to realize any secret sharing policy.
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of...
详细信息
Carmenisch et al. proposed a blind signature scheme based on the discrete logarithm during at the rump session of Eurocrypt'94. Horster er al. generalised this approach to design the Meta blind signature schemes. ...
详细信息
Carmenisch et al. proposed a blind signature scheme based on the discrete logarithm during at the rump session of Eurocrypt'94. Horster er al. generalised this approach to design the Meta blind signature schemes. The author of this letters points out that these schemes cannot provide true blind signatures.
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered ...
详细信息
Coordinating the action of distributed agents an a dynamically changing environment is a difficult task. The dificulty stems from the fact the real-world environment changes independently fromthe actions of the agents...
详细信息
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of...
详细信息
The design, development, and maintenance of large, complex software systems has long been plagued by the imposition of artificially frozen requirements. A design and development environment which allows a continuum of completion, yet preserves a stable system state is needed. A conceptual object-oriented software engineering environment is presented which separates, yet maintains inviolable ties between the design environment and the working environment.< >
In this paper, we analyze the performance of GI/GI/s/s+r systems. In particular we examine steady-state call blocking and time blocking. We vary several parameters such as the number of servers, the number of waiting ...
详细信息
In this paper, we analyze the performance of GI/GI/s/s+r systems. In particular we examine steady-state call blocking and time blocking. We vary several parameters such as the number of servers, the number of waiting spaces, the squared coefficients of variation of the arrival and the service processes, and the third moment of the arrival process. We show that these parameters significantly affect system performance. Thus, for most systems with bursty and skewed traffic patterns, simpler models are insufficient. However, in certain circumstances, when the arrivals are either highly bursty or highly skewed, the Markovian assumption gives acceptable approximations to the GI/GI/s/s+r model. Finally, we observe a behavior that is similar to Erlang's insensitivity property in the M/G/s/s model.< >
The virtual path (VP) concept has been gaining attention in terms of effective deployment of ATM (asynchronous transfer mode) networks in recent years. In this paper, we discuss a multi-hour, multi-traffic class netwo...
详细信息
The virtual path (VP) concept has been gaining attention in terms of effective deployment of ATM (asynchronous transfer mode) networks in recent years. In this paper, we discuss a multi-hour, multi-traffic class network (capacity) design model for providing specified quality-of-service in dynamically reconfigurable ATM networks. Our approach is based on statistical multiplexing of traffic within a traffic class by using a virtual path for the class and deterministic multiplexing of different virtual paths, and on providing dynamic bandwidth and reconfigurability through the virtual path concept depending on traffic load during the course of the day. We show that, for test problems based on realistic network data, our approach does between 6% to 20% better than a local shortest path heuristic in terms of network cost. We also show that considering network dynamism through variation of traffic during the course of a day by doing dynamic bandwidth and virtual path reconfiguration can save between 10% to 14% in network design costs compared to a static network based on maximum busy hour traffic.
During the past few years, the study of network management has focused on a single node, e.g., a router or a hub. As network connectivity and heterogeneity grows, there is a need to extend the scope of management from...
详细信息
During the past few years, the study of network management has focused on a single node, e.g., a router or a hub. As network connectivity and heterogeneity grows, there is a need to extend the scope of management from a few nodes to an enterprise environment where there is a number of networks interconnected by switching devices. In this paper, we attempt to provide a configuration, fault, and performance monitoring solution in an enterprise LAN network environment. First, we identify the managed objects which are subject to monitoring. Among the important managed objects are interconnection domains, switching devices, and LAN networks such as Ethernet, token ring and FDDI networks. Then we identify the management functions which can be applied during the monitoring process. Using scenarios, we demonstrate how these management functions can be applied.
暂无评论