security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro...
详细信息
The thesis also puts forward a fast handoff method based on RSSI and LQI, which makes improvements on preset parameters, subnet selection, decision standards and reparation of switching failure. The new method which c...
详细信息
A projection kernel regression framework is set and applied for image registration and fusion in video-based criminal investigation. In image registration, a dominant point is defined to capture the local variation pr...
详细信息
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with O...
详细信息
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with One block Hash function, and make a comparison with the most popular MD5 algorithm, improve the RFID authentication protocol by One block Hash function, and show the comparison with the now most popular algorithm on the security, computation and memory capability. This RFID authentication protocol based on one block Hash function can guarantee the safety, meanwhile, reduce the amount of computation of the tag, and achieve the function of low-power in authentic process of tags. It has resolved the two shackles in the development of the RFID system.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
ISBN:
(纸本)9781457720031
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to provide services for their own domain name. Secondly, these computers can be served as agents to hide mother-ship. The character of FFSN is that the DNS records of domain name changes constantly at a high frequency. In this paper, we analyze the issue on the reliability of FFSN. The issue is resulted from the uncontrollable nodes of FFSN. We establish a model to describe the reliability by the theory of Poisson Process, and analyze the relationship between the reliability of FFSN and its size.
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app...
详细信息
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The approaches based on subjective trust models are more adaptive and efficient than traditional binary logic based approaches. Most well known trust models use probability or fuzzy set theory to hold randomness or fuzziness respectively. Only cloud model based models consider both aspects of uncertainty. Although cloud model is ideal for representing trust degrees, it is not efficient for context aware trust evaluation and dynamic updates. By contrast, Bayesian network as an uncertain reasoning tool is more efficient for dynamic trust evaluation. An uncertain trust model that combines cloud model and Bayesian network is proposed in this paper.
Storage as a service (SaaS) or storage service provider (SSP) model enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. For users whose storage require...
详细信息
Storage as a service (SaaS) or storage service provider (SSP) model enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. For users whose storage requirements are unpredictable and users who need low-cost storage, the SaaS model is a good choice for its convenience and efficiency. However, security and reliability of SaaS have affected its widespread use. When users store their data in the SaaS server, they mostly concern about whether the data is intact;whether it can be recovered when there is a failure. This is the goal of remote data possession checking (RDPC) schemes. This paper firstly gives a simplified architecture of SaaS model and discusses the security requirements. Secondly, the state of the art research on RDPC is reviewed. The RDPC schemes are categorized into two types, namely provable data possession (PDP) and proof of retrievability (POR). Thirdly, the factors considered in designing an RDPC scheme are presented. Based on these factors, the comparisons of the existing schemes are illustrated. Finally, some future directions for RDPC research are proposed.
There exists lots of fuzzy and imprecise information with the development of society and technology. How to combine and evaluate these information becomes significant. This paper takes the proportion of the membership...
详细信息
Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ...
详细信息
暂无评论