Indoor positioning is a thriving research area, which is slowly gaining market momentum. Its applications are mostly customized, ad hoc installations;ubiquitous applications analogous to Global Navigation Satellite Sy...
详细信息
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa...
详细信息
ISBN:
(数字)9781728142487
ISBN:
(纸本)9781728142494
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not safe enough. In this paper, we propose a simple scheme for data integrity check called PN-HASH (Positive hash and Negative hash). PN-HASH is inspired by the negative representation of information, which is a research branch in the field of immune computation. This scheme computes two hash values of the input message and its negative representation. The resulting hashes are called the positive hash and the negative hash, respectively. The proposed scheme is simple but can improve the resistance to hash collision attacks. Furthermore, for more flexibility and higher security, we propose three extensions of PN-HASH. Security and complexity analyses show that PN-HASH could improve the security of underlying cryptographic hash functions, with approximately twice cost of them. To give exact examples, we present PN-MD5, an implementation of PN-HASH based on MD5.
With the rapid proliferation of smart devices in wireless networks, more powerful technologies are expected to fulfill the network requirements of high throughput, massive connectivity, and diversify quality of servic...
详细信息
In blockchain, miners make profits by packaging transactions. There are a large number of pending transactions in the blockchain, and users often assign high transaction fees to reduce the delay in transaction packagi...
详细信息
—In recent years, the multiple-input multiple-output (MIMO) non-orthogonal multiple-access (NOMA) systems have attracted a significant interest in the relevant research communities. As a potential precoding scheme, t...
详细信息
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid ***,the field of health informatics is also considered as an extremely important *** work observes the collaboration bet...
详细信息
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid ***,the field of health informatics is also considered as an extremely important *** work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing *** developed system has two front ends,the first dedicated for the user to perform the photographing of the trace *** the photographing is complete,mobile computing is used to extract the *** the signal is extracted,it is uploaded into the server and further analysis is performed on the signal in the *** this is done,the second interface,intended for the use of the physician,can download and view the trace from the *** data is securely held using a password-based authentication *** system presented here is one of the first attempts at delivering the total solution,and after further upgrades,it will be possible to deploy the system in a commercial setting.
Internet of Things (IoT) has attracted tremendous interest since it can improve production efficiency and system intelligence significantly. However, with the explosive growth of various types of device and data flow,...
详细信息
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been the focus of both academia and industry. However, the performance issue hinder...
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been the focus of both academia and industry. However, the performance issue hinders its large-scale application, highlighting the urgent requirements of high-performance FHE *** noticing the tremendous potential of GPUs in the field of cryptographic acceleration, this paper comprehensively investigates how to convert the available computing resources residing in GPUs into FHE workhorses, and implement a full set of low-level and middle-level FHE primitives based on two arithmetic units (i.e., INT32 and FP64 units) with three types of data precision (i.e., INT32, INT64 and FP64). This paper gives a comprehensive evaluation and comparison based on each road-map. Our implementations of fundamental functions outperform the implementations on the same platform by 1.7× to 16.7×. Taking CKKS FHE schemes as a case study, our implementation of homomorphic multiplication achieves 3.2× speedup over the state-of-the-art GPU-based implementation, even considering the difference of platforms. The detailed evaluation and comparison of this paper would offer a vital reference for the follow-up work to choose appropriate underlying arithmetic units and important primitive optimizations in GPU-based FHE implementations.
Multi-party learning provides solutions for training joint models with decentralized data under legal and practical constraints. However, traditional multi-party learning approaches are confronted with obstacles such ...
详细信息
Evolutionary multimodal optimization has received considerable attention in the past decade. Most existing evolutionary multimodal optimization algorithms are designed to solve problems with relatively few global opti...
详细信息
ISBN:
(数字)9781728124858
ISBN:
(纸本)9781728124865
Evolutionary multimodal optimization has received considerable attention in the past decade. Most existing evolutionary multimodal optimization algorithms are designed to solve problems with relatively few global optima. However, in real-world applications, the problems can possess a lot of global optima (and sometimes acceptable local optima). Finding more global optima can help us learn more about their landscapes and distributions. However, solving these problems with limited computational resources is a challenge for current algorithms. In this paper, many-modal optimization problems are studied, and each of them has more than 100 global optima. We first present a benchmark with 10 many-modal problems based on the existing multimodal optimization benchmarks. The numbers of global optima of these 10 problems vary from 108 to 7776. Second, we propose the difficulty-based cooperative co-evolution (DBCC) strategy for solving many-modal optimization problems. DBCC comprises four primary steps: problem separation, resource allocation, optimization, and solution reconstruction. The clonal selection algorithm is selected as the optimizer in DBCC. Experimental results demonstrate that DBCC provides satisfactory performance.
暂无评论