It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ...
详细信息
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe...
详细信息
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app...
详细信息
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The approaches based on subjective trust models are more adaptive and efficient than traditional binary logic based approaches. Most well known trust models use probability or fuzzy set theory to hold randomness or fuzziness respectively. Only cloud model based models consider both aspects of uncertainty. Although cloud model is ideal for representing trust degrees, it is not efficient for context aware trust evaluation and dynamic updates. By contrast, Bayesian network as an uncertain reasoning tool is more efficient for dynamic trust evaluation. An uncertain trust model that combines cloud model and Bayesian network is proposed in this paper.
Much of the security of many block ciphers depends on the cryptographic properties of the substitution boxes (S-boxes). Although many design methods of S-boxes with desirable properties have been studied, there are fe...
详细信息
The restoration quality of a motion-blurred image is highly dependent on the estimation accuracy of the motion blurring parameter. This manuscript presents a novel and precise method for estimation of the motion blurr...
详细信息
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate m...
详细信息
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate methods, to assess an information system by investigating vulnerabilities in its architecture, hardware, software, networks, and protocols. These methods can be divided into two categories: rule-based and model-based, and the later draws more research focuses at present. In this paper we make an extensive survey on existing model-based approaches to security assessment of vulnerabilities in information systems, analysing their working mechanics, advantages and disadvantages. Finally, conclusions are made on open problems in model-based security assessment, and on the possible future directions of the research.
Exclusion Basis Systems (EBS) is a combinatorial optimization methodology for key management of group communication. The EBS approach proves to be very scalable for large networks and enables great flexibility in netw...
详细信息
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nod...
详细信息
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nodes to carry and forward messages, messages can be eventually delivered to their destination by mobile nodes with an appropriate routing protocol. To have achieved a successful delivery, most DTN routing protocols use message duplication methods. Although messages are rapidly transferred to the destination, the redundancy in the number of message copies increases rapidly. This paper presents a new routing scheme based on a stochastic process for epidemic routing. Message redundancy is efficiently reduced and the number of message copies is controlled reasonably. During the contact process of nodes in the network, the number of message copies changes, and according to the variability in the number of copies, we construct a special Markov chain, birth and death process, on the number of message copies then calculate and obtain a stationary distribution of the birth and death process. Comparing the theoretical model with the simulation we have performed we see similar results. Our method improves on time-to-live (TTL) and antipacket methods, in both redundancy and delivery success efficiency.
A class of balanced semi-bent functions with an even number of variables is proposed. It is shown that they include one subclass of semi-bent functions with maximum algebraic degrees. Furthermore, an example of semi-b...
详细信息
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Node...
详细信息
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Nodes, we proposed a Block Gathering Based Page Segmentation algorithm (BGBPS). The experiment shows that BGBPS algorithm has great effect on semantic segmentation of mobile web page.
暂无评论