This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm...
详细信息
As interest in the cloud increases, there has been a lot of talk about the maturity and trustworthiness of cloud storage technologies. Is it still hype or is it real? Many endusers and IT managers are getting very exc...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture to ensure anonymity and certification for Internet of Things. We use pseudonym and threshold secret sharing approach to resolve conflict between anonymity and certification. Moreover, the implementation of Bloom filter offers security authentication for remote command. security analysis shows that the proposed mechanism can perfectly achieve tradeoff between anonymity, certification, and also resist impersonation, tamper as well as compromise attacks.
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a...
详细信息
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few P2P protocol provides complete anonymity as well as traceability. In this paper, we propose a security mechanism to ensure anonymity for honest peers and traceability for misbehaving peers in P2P systems. We utilize superposition watermarking based anonymity trace scheme to resolve the conflicts between traceability and anonymity. This scheme uses information processing technology similar to CDMA to superpose path information. security analysis and simulation result show that the superposition watermarking based P2P anonymity trace scheme (SWP2P) can attain tradeoff between anonymity and traceability perfectly.
This work considers the communication scenario where multiple sources transmit information to one or more receivers and these receivers request the information from all the sources. We construct a secret and reliable ...
详细信息
In this paper, we propose a distributed angle estimation method for wireless sensor network localization with multipath fading. The multiple antenna system is equipped at the anchor and the angle of departure (AOD) ca...
详细信息
In this paper, we propose a distributed angle estimation method for wireless sensor network localization with multipath fading. The multiple antenna system is equipped at the anchor and the angle of departure (AOD) can be estimated individually at each sensor node with single antenna system. Further, we exploit the space diversity to improve the estimation performance by deploying multiple parallel arrays at the anchor. Analysis and simulations demonstrate the effectiveness of our method.
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ...
详细信息
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
There exists lots of fuzzy and imprecise information with the development of society and technology. How to combine and evaluate these information becomes significant. This paper takes the proportion of the membership...
详细信息
There exists lots of fuzzy and imprecise information with the development of society and technology. How to combine and evaluate these information becomes significant. This paper takes the proportion of the membership function values into consideration and makes use of each interval area value compared with the whole area of fuzzy number to measure the distribution of the membership function values. A triangular membership function was used to represent the fuzzy numbers. Then, the BPA of each point selected can be gained through multiplying the membership function values with their proportion respectively. At last,the D/S Theory was used to aggregate the fuzzy numbers. Through an instance, we get an acceptable result.
Evaluation for target threat is an important part in the defensive decision making. As to each target, there are multiple attributes described by fuzzy or uncertain information which is represented with interval numbe...
详细信息
Evaluation for target threat is an important part in the defensive decision making. As to each target, there are multiple attributes described by fuzzy or uncertain information which is represented with interval numbers. How to integrate these fuzzy information becomes a meaningful work. This paper integrates the fuzzy numbers by introducing the distance among interval numbers to. nd a special interval number whose distance is the optimal value from all other interval numbers, then the comparison between multi-attributive targets is transformed into the comparison among only several interval numbers. On this basis, this paper solves the question about how to make a sequence among the aerial targets according to their different threat degrees.
Inherent complexity and uncertainty of E-commerce security necessitate the participation of many experts in multi criteria decision making. One of the key problems in the assessment of E-commerce security is how to su...
详细信息
暂无评论