Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In...
详细信息
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.
The Digital Video Broadcasting second generation Terrestrial (DVB-T2) standard purposes to provide high definition digital video and high rate services for the same spectrum allocation of the current Digital Video Bro...
详细信息
The Digital Video Broadcasting second generation Terrestrial (DVB-T2) standard purposes to provide high definition digital video and high rate services for the same spectrum allocation of the current Digital Video Broadcasting Terrestrial (DVB-T) standard. The implementation guideline is provided by the DVB-T2 standardization community, the Digital Video Broadcasting (DVB) Project. The DVB Project is requesting the many submission technologies which could be considered as candidates for a second generation terrestrial transmission system. The most challenging requirements introduced by the DVB-T2 specification are an Fast Fourier Transform (FFT) size of up to 32k samples, 256-Quadrature amplitude modulation (QAM) and Low-Density Parity-Check (LDPC) coding with a block size of 64k bits. The increasing concern in Multiple-Input Multiple-Output (MIMO) systems has given rise to numerous research activities in recent years. In this paper, we propose the MIMO architecture and coded cooperative MIMO transmission scheme for DVB-T2 system. The simulation result of the proposal MIMO architecture in DVB-T2 system shows a definite performance improvement for coded cooperative MIMO system.
This paper proposes a new document clustering method using the semantic features and fuzzy association. The proposed method can improve the quality of document clustering because the clustered documents by using fuzzy...
详细信息
Facial expression is one of the most expressive ways for human beings to deliver their emotion, intention, and other nonverbal messages in face to face communications. In this chapter, a layered parametric framework i...
详细信息
Feedback delays are inherent attributes of distributed control systems that usually cause unfavorable effect on the stability of the controlled process. Modelling of such systems is essential for traceable controller ...
详细信息
Feedback delays are inherent attributes of distributed control systems that usually cause unfavorable effect on the stability of the controlled process. Modelling of such systems is essential for traceable controller synthesis. In this paper we apply the TP Model Transformation to derive a polytopic representation of an LPV model where the time-delay is considered as parameter. The method is introduced via a single degree of freedom impedance model with feedback delay. The resulted model is validated by simulation.
The scarcity of accessible information mediums for visually impaired people is recognized by many international organizations. The situation is even worse for those students with visual impairment who have integrated ...
详细信息
This numerical study of dispersion characteristics of some symmetric and asymmetric composites modelled as multilayered packets of layers with arbitrary anisotropy of each layer is carried out. The authors introduce a...
This paper explains our developing Corpus of Japanese classroom Lecture speech Contents (henceforth, denoted as CJLC). Increasing e-Learning contents demand a sophisticated interactive browsing system for themselves, ...
This paper explains our developing Corpus of Japanese classroom Lecture speech Contents (henceforth, denoted as CJLC). Increasing e-Learning contents demand a sophisticated interactive browsing system for themselves, however, existing tools do not satisfy such a requirement. Many researches including large vocabulary continuous speech recognition and extraction of important sentences against lecture contents are necessary in order to realize the above system. CJLC is designed as their fundamental basis, and consists of speech, transcriptions, and slides that were collected in real university classroom lectures.
Over the past decade, wireless communications has seen an exponential growth and will certainly continue to witness spectacular developments due to the emergence of new interactive multimedia applications and highly i...
详细信息
Over the past decade, wireless communications has seen an exponential growth and will certainly continue to witness spectacular developments due to the emergence of new interactive multimedia applications and highly integrated systems driven by the rapid growth in information services and microelectronic devices. So far, most of the current mobile systems are mainly targeted to voice communications with low transmission rates. In the near future, however, broadband data access at high transmission rates will be needed to provide users packet-based connectivity to a plethora of services. It is also almost certain that the neXt Generation (XG) wireless systems will consist of complementary systems with a set of different standards and technologies along with different requirements and complementary capabilities that will offer users ubiquitous wireless connectivity between mobile and desktop computers, machines, game systems, cellular phones, consumer electronic products, and other hand-held devices. A key requirement in future wireless systems is their ability to provide broadband connectivity with end-to-end quality of service (QoS), a high network capacity, and throughput at a low cost. This talk will present an overview of the most recent trends along with the evolution of wireless systems. It will also describe and discuss the challenges facing the XG broadband systems with a special interest on cognitive ubiquitous communications networks, cooperative communications, dynamic resource allocation, along with cross-layer design and optimization.
Most of the image watermarking methods, using the properties of the human visual system (HVS), have been proposed in literature. The component of the visual threshold is usually related to either the spatial contrast ...
详细信息
Most of the image watermarking methods, using the properties of the human visual system (HVS), have been proposed in literature. The component of the visual threshold is usually related to either the spatial contrast sensitivity function (CSF) or the visual masking. Especially on the contrast masking, most methods have not mention to the effect near to the edge region. Since the HVS is sensitive what happens on the edge area. This paper proposes ultrasound image watermarking using the visual threshold corresponding to the HVS in which the coefficients in a DCT-block have been classified based on the texture, edge, and plain area. This classification method enables not only useful for imperceptibility when the watermark is insert into an image but also achievable a robustness of watermark detection. A comparison of the proposed method with other methods has been carried out which shown that the proposed method robusts to blockwise memoryless manipulations, and also robust against noise addition.
暂无评论