In this paper, the quaternion discrete Cosine transform (QDCT) is applied to the color image encryption technology, and partial encryption technique of color image based on QDCT is proposed. Obtained the QDCT spectrum...
详细信息
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec...
详细信息
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...
详细信息
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.
At present, event detection technologies have become an important part in building efficient wireless sensor networks. One of the popular and excellent event detecting algorithms is the improved Neighbor-based Fuzzy L...
详细信息
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants...
详细信息
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.
Wireless sensor networks are composed of numerous sensor nodes in the monitored area, which have been well applied in various practical areas. In these applications, data security from sensors has been threatened. The...
详细信息
In the face of a large number of task requests which are submitted by users, the cloud data centers need not only to finish these massive tasks but also to satisfy the user's service demand. How to allocate virtua...
详细信息
Partly dependent tasks (PDTs) scheduling with multi-objective optimization in cloud computing is an NP-hard problem. Taking the quality of service (QoS) requirements of users that use cloud computing into account, we ...
详细信息
MapReduce is a popular programming model for the purposes of processing large data sets. Speculative execution known as an approach for dealing with the above problems works by backing up those tasks running on a low ...
详细信息
MapReduce is a popular programming model for the purposes of processing large data sets. Speculative execution known as an approach for dealing with the above problems works by backing up those tasks running on a low performance machine to a higher one. In this paper, we have modified some pitfalls and taken computer hardware into consideration (HWC-Speculation). We also have implemented it in Hadoop-2.6 and experiment results show that our method can assign tasks evenly, improve the performance of MRV2 and decrease the execution time.
暂无评论