Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ...
详细信息
A novel self-adaptive differential evolution (SADE) algorithm is proposed in this paper. SADE adjusts the mutation rate F and the crossover rate CR adaptively, taking account of the different distribution of populatio...
详细信息
Orthogonal Frequency Division Multiplexing (OFDM) systems may suffer from both carrier frequency offset (CFO) and in-phase/quadrature-phase (I/Q) imbalance at the receiver front end. In this paper, a novel type of int...
详细信息
An Unattended Wireless Sensor network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors clos...
详细信息
An Unattended Wireless Sensor network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors close to the base station deplete their power earlier than others. An UWSN can save the battery power and prolong the network lifetime. Unfortunately, MSs would be given too much privilege when acting as the collecting base station, which will cause security concern if compromised. Besides, UWSNs are usually deployed in unreachable and hostile environments, where sensors can be easily compromised. Thus, their security issues should be carefully addressed to deal with node compromise. In this paper, we present a novel key management scheme to secure UWSNs. We employ the Blundo symmetric polynomial mechanism to guard against the newly compromised nodes in a period while utilizing the periodic key updating based on the reverse hash chain to block the compromised nodes and revoke the compromised MSs if failing the authentication. We show that our scheme is robust against node compromised attacks and carry out comparison analysis on the intrusion-tolerance ratio, communication and computing overhead.
The algorithm applied to video watermark based on HVS is rare recently, but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary,which ...
详细信息
The algorithm applied to video watermark based on HVS is rare recently, but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary,which can make robustness and invisibility best balanced. This article gives a new algorithm about digital video watermarking based on HVS,which makes digital video watermark greatly improved.
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at...
详细信息
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or attribute noise for the benefit of the subsequent mining process. In this paper, we propose an error-sensitive(ES) data mining framework, which makes use of noise knowledge to restore original data distributions and accommodates noise knowledge to enhance data classification accuracy. We materialize our main idea by constructing Attribute-Decision tree and measureing correlation among attributes. Experimental results show that ES data mining procedure has ability to significantly improve the quality of data mining results.
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Node...
详细信息
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Nodes, we proposed a Block Gathering Based Page Segmentation algorithm (BGBPS). The experiment shows that BGBPS algorithm has great effect on semantic segmentation of mobile web page.
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail...
详细信息
ISBN:
(纸本)9781457702495
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail. This paper proposes a Webmail XSS fuzzer called L-WMxD (Lexical based Webmail XSS Discoverer). L-WMxD , which works on a lexical based mutation engine, is an active defense system to discover XSS before the Webmail application is online for service. The engine is initialized by normal JavaScript code called seed. Then, rules are applied to the sensitive strings in the seed which are picked out through a lexical parser. After that, the mutation engine issues multiple test cases. Newly-generated test cases are used for XSS test. Two prototype tools are realized by us to send the newly-generated test cases to various Webmail servers to discover XSS vulnerability. Experimental results of L-WMxD are quite encouraging. We have run L-WMxD over 26 real-world Webmail applications and found vulnerabilities in 21 Webmail services, including some of the most widely used Yahoo!Mail, Mirapoint Webmail and ORACLE' Collaboration Suite Mail.
For the requirements of large-scale real-time vehicle GPS data map matching in application, this paper proposes a parallel algorithm for road matching based on multi-core and MPI(Massage Passing Interface). Several ba...
详细信息
For the requirements of large-scale real-time vehicle GPS data map matching in application, this paper proposes a parallel algorithm for road matching based on multi-core and MPI(Massage Passing Interface). Several basic questions for road matching are discussed, such as maps storage structure, matching elements, and alternative road chain searching. Then, based on multi-core and MPI computing platform, the parallel algorithm for road matching is implemented, with actual road network and floating car data. The validation results show that the algorithm not only has high speedup rate and efficiency, but also the matching results are credible.
Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. Due to the involvement of an EAP server and several round trips between a mobile node (MN)...
详细信息
Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. Due to the involvement of an EAP server and several round trips between a mobile node (MN) and the EAP server, a full EAP authentication takes about 1000ms which is unacceptable in a handover process. This paper proposes a privacy preserving handover authentication scheme for EAP-based wireless networks. We use the proxy signature scheme to accomplish authentication between MN and an access point (AP) without involving the third party. The detailed security analysis shows that our scheme can achieve the privacy preserving and forward/backward security. In addition, we evaluate the latency performance of the proposed scheme by the analysis and simulation. The results demonstrate that our scheme is more efficient in terms of computation and communication overheads.
暂无评论