Potential applications have fostered the rapid development of wireless sensor network. Power control technology contributes as a fundamental part in fault tolerant topology control, through which simplified reliably c...
详细信息
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this ...
详细信息
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this paper to solve this problem, in which mathematic analysis and some measures are presented to defense against several malicious attacks. The experimental results show that, compared to the current some trust models, the proposed model is more robust on trust security problems and more advanced in successful transaction rate.
The Eleman Neural network has been widely used in various fields ranging from temporal version of the Exclusive-OR function to the discovery of syntactic categories in natural language date. However, one of the proble...
详细信息
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result...
详细信息
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result shows that this stream cipher structure has potential security weakness when the design of the filter Boolean function is improper.
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault dete...
详细信息
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault detection modules. The notion of threshold Byzantine Quorum system (TBQS) was presented grounded on this architecture. TBQS can be used together with erasure coding or threshold schemes to design survivable storage systems. Storage systems based on TBQS can tolerant 1/4 faulty nodes and thus provide a solid data service.
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega...
详细信息
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delegation side, then newly searches, finds other chain discovery until the end. It solves the negative credentials, compared with the time and space complicated degree of the original arithmetic, the algorithm is more simple and shortcut.
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studi...
详细信息
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studied, designed and implemented. Multi-processor, multi-process and RM communication mechanism are used and new decoded data structure, core functional modules and process schedule policies are designed to resolve bottleneck of seizing packet and speed detection and analysis. Performance is tested using Smartbit and real network traffic from network center of south China, availab.lity and feasibility are validated.
Routers are effective building blocks for Internet. It is almost impossible to modify router software only for applications. How to satisfy applications' specific requirements of communication is a big problem. No...
详细信息
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that ...
详细信息
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that the accessed peer cannot offer instant data when it is offline. This scheme carries out encryption and decryption by using ElGamal cryptography. It defines the delegating-agents protocol, the produce of the delegation-key protocol and the decryption protocol, thus implementing the cheat-resisted and quorum controlled time constraint delegation of decryption. And the new scheme is supplemented to settle the problems of the key being renewed dynamically, the agent being added or deleted and the agent's information being maintained. Compared with the previous time constraint delegation of the decryption scheme, it improves security, flexibility and efficiency.
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is no...
详细信息
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is not only short in key size due to the use of the elliptic cryptosystem, but also efficient in computation because of bilinear mapping.
暂无评论