In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem,and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself,and it can defend positive attack of dealer and participants.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they give two solutions that are applicable for the case k>m/2,in Nikov et al.'s scheme,they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k,in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro...
详细信息
ISBN:
(纸本)9787900769428
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we propose a new multicast fault-tolerant approach-FH-TFTM based on proposed multicast fault-tolerant algorithms. It can go over problems faced in traditional approaches, for example node failure, unpredictable problems, time delay, network cost and loop avoidance. FH-TFTM can reduce consuming network resources, and carry out effectively setting up backup paths.
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen...
详细信息
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish au...
详细信息
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish autonomous tasks. The characteristic model(CM) based all-coefficient adaptive control(ACAC) designed for PPF systems in horizontal and vertical trajectory control is proposed. The method is easy to use and convenient to adjust and test. Just a few parameters are adapted during the control process. In application, vertical and horizontal CMs are designed and ACAC controllers are constructed to control vertical altitude and horizontal trajectory of PPF based on the proposed CMs, respectively. Result analysis of different simulations shows that the applied ACAC control method is effective for trajectory tracking of the PPF systems and the approach guarantees the transient performance of the PPF systems with better disturbance rejection ability.
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and pa...
详细信息
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and passwords for different *** solve these problems,a lot of authentication schemes for multi-server environment have been ***,Odelu and Das et *** a secure multi-server authentication protocol based on smart card,biometric and elliptic curve cryptography(ECC) .We firstly analyze Odelu et al.'s scheme and find some flaws as follows:1) the scheme may suffer Denial of Service(Dos) attack and insider attack;2) The scheme doesn't have strong robustness because improper work of the register center(RC) may lead to the collapse of the whole system;3) There are some design flaws in this *** example,the user cannot choose his/her identity randomly and the register center needs to maintain a data *** order to solve these problems,this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch *** verify the security of the proposed scheme,we simulate our scheme using BAN logic and Pro Verif *** a thorough analysis,we can see that the proposed schemenot only has stronger security but also has less computation cost than Odelu et al.'s protocol.
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c...
详细信息
Tandem mass spectrometry (MS/MS) is a widely used technique for protein identification, post-translational modifications, immunotherapy, and other applications. As the amount of MS/MS spectra data increases, new compu...
详细信息
暂无评论