Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer...
详细信息
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Certificateless encryption (CLE) scheme with short ciphertext. The ciphertext length is at least |m|-bit (the length of a plaintext) shorter than the existing CLE schemes while retaining similar efficiency of computation. The new scheme is provably secure against adaptive chosen ciphertext attacks in the random oracle model.
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malic...
详细信息
Temporal logics of knowledge are useful for reasoning about situations where we require both dynamic aspects and informational aspects relating to knowledge. So, the application of temporal logics of knowledge is inve...
详细信息
The minimum variance distortionless response(MVDR) beamformer has better resolution and much better interference rejection capability than the data-independent ***,the former is more sensitive to errors,such as the st...
详细信息
The minimum variance distortionless response(MVDR) beamformer has better resolution and much better interference rejection capability than the data-independent ***,the former is more sensitive to errors,such as the steering vector errors caused by direction of arrival mismatch,imprecise array calibration or any other possible factors,especially in the case of high signal-to-noise ratio(SNR).A new robust MVDR beamformer against the general steering vector errors is proposed in this *** method is based on the reconstruction of the covariance matrix which aims to reduce the power of the signal of interest(SOI) in the covariance *** eigenanalysis is used in the process of removing the SOI component and modifying the residual covariance *** results show that the proposed method has excellent signal-to-interference-plus-noise ratio(SINR) performance under the mismatch condition.
Based on the analysis to the phenomenon and methods of denial-of-sleep attacking in wireless sensor network, a scheme is proposed employing fake schedule switch with RSSI measurement aid. The sensor nodes can reduce a...
详细信息
Open-vocabulary object detection (OVD) aims to detect objects beyond the training annotations, where detectors are usually aligned to a pre-trained vision-language model, e.g., CLIP, to inherit its generalizable recog...
详细信息
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in Ad Hoc networks,a non-intrusive multi-metric Ad Hoc Routing Protocol-NIMR is *** c...
详细信息
This paper presents a new efficient identity-based broadcast encryption scheme using bilinear mapping. Both private-key storage for one authorized user (only two group elements) and communication transmission bandwidt...
详细信息
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...
详细信息
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c...
详细信息
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group can illegally obtain most secret messages without introducing any error. Finally, a possible way to avoid the security flaw is suggested.
暂无评论