Without actively aligning the reference frames, the reference-frame-independent quantum key distribution (RFI-QKD) can generate secure keys even when the reference frames drift slowly. Here, we propose a new scheme on...
详细信息
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attri...
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
In a VANET (Vehicular Ad Hoc network), the collisions caused by vehicles' mobility lead to poor network performance, especially in high-density network. In order to increase the flexibility of communication, this ...
详细信息
ISBN:
(纸本)9781509016990
In a VANET (Vehicular Ad Hoc network), the collisions caused by vehicles' mobility lead to poor network performance, especially in high-density network. In order to increase the flexibility of communication, this paper presents a communication protocol with dynamic choosing relay node and automatic cooperative communication called VC-TDMA (Vehicular Cooperative TDMA). The nodes can choose the multi-hop relay nodes rationally and other idle nodes can provide cooperative communication automatically. Considering batch arrival data traffic, the buffer queue state of nodes in the network is numerical analyzed by Markov Chain. The simulation results show that VC-TDMA can improve the throughput of the network compared with the conventional TDMA protocol.
As a frequently used query operation for online applications,secure k-nearest neighbors(k-NN)computation on encrypted cloud data has received much *** this paper,we focus on the problem of supporting efficient k-NN co...
详细信息
ISBN:
(纸本)9781509012572
As a frequently used query operation for online applications,secure k-nearest neighbors(k-NN)computation on encrypted cloud data has received much *** this paper,we focus on the problem of supporting efficient k-NN computation over encrypted cloud data while data owner cannot share his secret keys with query *** give a security analysis of the scheme proposed by Zhu et al.[16],and the analysis shows the scheme cannot provide query privacy at *** we design a new efficient construction to support efficient k-NN computation over encrypted cloud data without key ***,security analysis is presented to demonstrate the new scheme can provide data privacy and query privacy in the Known Ciphertext Model.
To achieve the flexible and efficient transmission of files in the video on demand system, this paper proposed a three-tier fragmentation strategy which provided a unfiled method of fragmentation for video of HTTP Liv...
详细信息
ISBN:
(纸本)9781509056972
To achieve the flexible and efficient transmission of files in the video on demand system, this paper proposed a three-tier fragmentation strategy which provided a unfiled method of fragmentation for video of HTTP Live Streaming and large file. In order to prove the rationality of the three-tier fragmentation strategy, we compared it with the two layers fragmentation strategy and the fragmentation strategy of equal time. And the comparisons proved the superiority of three-tier fragmentation strategy.
In HEVC, prediction mode decision is essential for efficient coding in applications. While many fast algorithms have been designed to reduce the candidate modes, the features of scene switch frames have seldom been co...
详细信息
ISBN:
(纸本)9781509028610
In HEVC, prediction mode decision is essential for efficient coding in applications. While many fast algorithms have been designed to reduce the candidate modes, the features of scene switch frames have seldom been considered. These frames usually have no relationship with the previous frames. Thus, intra modes should be used. In this paper, we propose a simple and efficient Hash-based algorithm. It evaluates the motion intensity of videos and can detect the occurrence of scene switch efficiently. Then chooses the best prediction modes among intra ones directly for CUs in these frames. Experimental results show that it achieves 42% to 53% time saving of the switch frame prediction. Meanwhile, as the prediction time of a switch frame is about 5 to 13 times over that of a normal continuous frame, the algorithm can achieve an outstanding improvement in the prediction of the whole video, especially when dealing with multi-scene videos.
On the basis of studying the principle and application technology of P2P protocol, we design the private protocol of P2P application layer to meet the needs of P2P communication. This application layer protocol splits...
详细信息
ISBN:
(纸本)9781509056972
On the basis of studying the principle and application technology of P2P protocol, we design the private protocol of P2P application layer to meet the needs of P2P communication. This application layer protocol splits up video into three types of blocks in order to improve transmission efficiency. Besides, the protocol can be expanded when needed since there are some invalid bits in the state list.
In this paper, we introduce the concept of OFDM-PON, and introduce the best method to choose the maximum sleep time based on link speed and queue buffer capacity. By analyzing the relationship between the longest slee...
详细信息
ISBN:
(纸本)9781509028610
In this paper, we introduce the concept of OFDM-PON, and introduce the best method to choose the maximum sleep time based on link speed and queue buffer capacity. By analyzing the relationship between the longest sleep time and the queue buffer capacity, it is concluded that inducing cognition into OFDM-PON can be used as an effective method to improve the energy efficiency.
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl...
详细信息
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation problem in areas with coding opportunities, and degrades the network performance. This paper proposes a Load balanced coding aware multipath routing(LCMR)for wireless mesh networks. To facilitate the evaluation of discovered multiple paths and the tradeoffs between coding opportunity and load balancing, a novel routing metric, Load balanced coding aware routing metric(LCRM) is presented, which considers the load degree of nodes when detects coding opportunities. LCMR could spread traffic over multipath to further balance load. Simulation results demonstrate that LCMR could evenly spread the traffic over the network with increasing network throughput in a heavy load at the expense of some coding opportunities.
—Based on the distinguishing features of multi-tier millimeter wave (mmWave) networks such as different transmit powers, different directivity gains from directional beamforming alignment and path loss laws for line-...
详细信息
暂无评论