Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature ...
详细信息
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing. However, cloud users usually are mobile devices which are constrained with processing and power limitations. When a mobile user obtain the converted signature from the proxy (cloud server), it still can not verify it due to the heavy computation cost. We propose a new definition of server-aided verification proxy re-signature which consist of a proxy re-signature scheme and a server-aided verification protocol. With the server-aided verification protocol, some computational tasks for a proxy re-signature verification are carried out by the proxy (cloud server), which is generally untrusted, therefore, it is very useful for mobile devices. We present, on the basis of Ateniese and Hohenberger's unidirectional proxy re-signature scheme, two novel existential unforgeability server-aided verification proxy re-signature schemes.
In this paper, we propose a robust object tracking algorithm based on SURF. First, we adopt a two-stage matching method to improve the accuracy of SURF matching points. Then a template update method is used to deal wi...
详细信息
In this paper, we propose a robust object tracking algorithm based on SURF. First, we adopt a two-stage matching method to improve the accuracy of SURF matching points. Then a template update method is used to deal with the problem of object appearance change. Next we use matching points between new template and candidate region to locate the initial position of object. As template update and object occlusion will cause the accumulation of tracking errors, therefore, at last fixed template is used to correct object's position. For those frames which have little matching points, we use Meanshift instead of SURF to track object. The experiments demonstrate that our work is robust and can track object accurately in complex environments.
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures...
详细信息
To resolve the problem of assessing the effect of a network attack, this paper combines cross entropy with network character entropy method and proposes scheme to evaluate the malicious code attack effect. It captures the related indicators in real time and normalizes the data so as to evaluate it at the same level. It adopts cross entropy method to pretreat the indicators adaptively. We calculate the weight coefficient and exploit network character entropy method to evaluate the attack with accuracy according to the importance of the indicators in the evaluation system. Experimental results and corresponding comparisons reveal that the proposed method can quantitatively determine the exact effect of the malicious code attack.
Association rule analysis, as one of the significant means of data mining, plays an important role in discovering the implicit knowledge in massive transaction data. Aiming at the inherent defects of the classic Aprio...
详细信息
With Rytov approximation theory, we derive the analytic expression of de- tection probability of Airy vortex beam carrying orbital angular momentum (OAM) through an anisotropic weak oceanic turbulence. We investigate ...
详细信息
The advancement of the Internet of Things (IoT) has enabled a variety of innovative consumer electronics applications. In particular, multi-modal applications integrating audio, video, and haptic interactions have eme...
详细信息
With the rise of the Internet of Everything, machine-type wireless video applications like intelligent surveillance are increasingly becoming mainstream network services. However, the massive transmission of video str...
详细信息
With the rapid development of mobile internet cloud computing, the traditional network structure becomes non-suitable for advanced network traffic requirements. A service migration decision algorithm is proposed in th...
详细信息
We design a novel fully convolutional network architecture for shapes, denoted by Shape Fully Convolutional networks (SFCN). 3D shapes are represented as graph structures in the SFCN architecture, based on novel graph...
详细信息
Super resolution (SR) through neighbor embedding is recognized as an effective way to produce a high resolution (HR) image. However, this learning-based method is clumsy at preserving sharper edges and suppressing unw...
详细信息
暂无评论