In this paper, we surveyed several wellknown batch verification multiple digital signatures. These schemes can batch verify multiple digital signatures which need only one verification instead of t verifications. Howe...
详细信息
In this paper, we surveyed several wellknown batch verification multiple digital signatures. These schemes can batch verify multiple digital signatures which need only one verification instead of t verifications. However, a number of weaknesses of these schemes are pointed out. According to our proposed issues and challenges, we compared and analyzed them. To sum up these schemes, a secure and efficient multiple digital signatures scheme which needs only one verification remains an open problem.
To provide statistical service guarantee and achieve high network utilization, measurement-based admission control (MBAC) has been studied for over one decade. Many MBAC algorithms have been proposed in the literature...
详细信息
The current generation of P2P networks is intended to provide cost-effective alternatives to the traditional client-server architecture. The main goal is to store and retrieve data in a decentralized manner. The chall...
详细信息
The current generation of P2P networks is intended to provide cost-effective alternatives to the traditional client-server architecture. The main goal is to store and retrieve data in a decentralized manner. The challenge in doing so consists in creating a stable overlay network that allows for fast and efficient searches. In this paper we consider the Chord P2P algorithm in this context and analyze its stability and efficiency with stochastic methods. We present realistic probabilities for a disconnection and investigate the corresponding scalability.
Current trends in the global economy are leading to inter-enterprise interactions and to new business models that depend on the timely notification of events and the reaction to them. In this paper we present a distri...
详细信息
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new ...
详细信息
Mobile ad-hoc networks (MANETs) comprise computer nodes which communicate over wireless links without any central control. Therefore, they must be able to make fully autonomous security decisions. This introduces new security challenges that existing security models and mechanisms do not adequately address (Campbell, 2002). In this paper we present a trust-based security system that deals with the specific challenges of MANETs by combining decentralised security management and context-aware computing. With this combination, our trust-based security system can establish appropriate trust levels for every situation.
Peer-to-peer (P2P) networks offer reliable and efficient services in different application scenarios. In particular, structured P2P protocols (like Chord (L. Stoica et al., 2001)) have to handle changes in the overlay...
详细信息
Peer-to-peer (P2P) networks offer reliable and efficient services in different application scenarios. In particular, structured P2P protocols (like Chord (L. Stoica et al., 2001)) have to handle changes in the overlay topology fast and with as little signaling overhead as possible. This paper analyzes the ability of the Chord protocol to keep the network structure up to date, even in environments with high churn rates, i.e. nodes joining and leaving the network frequently. High churn rates occur, e.g., in mobile environments, where participants have to deal with the limited resources of their mobile devices, such as short battery lifetimes or high communication costs. In this paper, we analyze different design parameters and their influence on the stability of Chord-based network structures. We also present several modifications to the basic Chord stabilization scheme, resulting in a much more stable overlay topology.
This paper clarifies a necessary condition and a sufficient condition for transmissibility for a given set of general sources and a given general broadcast channel. The approach is based on the information-spectrum me...
详细信息
Some data mining tasks can produce such great amounts of data that we have to cope with a new knowledge management problem. Frequent itemset mining fits in this category. Different approaches were proposed to handle o...
详细信息
The extraction of face and facial components in images is a preprocessing for face recognition. In this paper, a new method for the extraction of face and facial components in color images is proposed. For efficient e...
详细信息
The extraction of face and facial components in images is a preprocessing for face recognition. In this paper, a new method for the extraction of face and facial components in color images is proposed. For efficient extraction using image processing, we analyze and improve detecting facial components that are the basis of an image characteristic. The proposed algorithm includes face region detection without the effect of skin color hairs, eye region detection with weighted template matching, eyebrow region detection using a modified histogram, and mouth region detection using skin characteristics. This method provides better accuracy in the extraction of face region and facial components compared with the existing methods and several faces in the same image can be extracted.
暂无评论