Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem...
详细信息
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t...
详细信息
In order to identify any traces of suspicious activities for the networks security, network Traffic Analysis has been the basis of networksecurity and network management. With the continued emergence of new applicati...
详细信息
In order to identify any traces of suspicious activities for the networks security, network Traffic Analysis has been the basis of networksecurity and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by dividing the whole group into subgroups. However, many of the prev...
详细信息
In the traditional DRM(Digital Rights Management) scheme, each user must buy a license for a digital content ,and can not share this content with his friends. But,with the development of digital content industry ,this...
详细信息
This paper discusses the price discrimination in wireless service allocation on the basis of game theory. The wireless service providers can supply the service with different prices. Two service price discrimination m...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement *** this mechanism a single user,whose attributes satisfy the predicate,endorses the *** signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the *** security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
In view of the situation that wireless sensor networks have some features like limited resources, the vulnerability, the frequent changes in network topology, this paper puts forward a designed key management in WSN w...
详细信息
The technique of high-speed network data stream capture has been a main topic of network research. This paper finds out some key technical problems that exist on high-speed network data stream capture and makes some i...
详细信息
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert...
详细信息
ISBN:
(纸本)9789881701282
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is converted to the simpler problem of annihilators of the single-output assistant function. Based on this, we propose a new method for constructing single-and multi-output Boolean functions with high algebraic immunity of the graphs. This method can also give many more general single-output Boolean functions with maximum algebraic immunity.
暂无评论