In order to obtain the network performance metrics from the Netflow, the reliability of obtaining the network metrics from the sampled Netflow is analyzed. A Netflow based network service QoS (quality of service) moni...
详细信息
In order to obtain the network performance metrics from the Netflow, the reliability of obtaining the network metrics from the sampled Netflow is analyzed. A Netflow based network service QoS (quality of service) monitor system is designed. The dactylogram of services can be distilled and used as the QoS baseline to judge the status of the services. The data analysis method, the variety of single zone's behavior and the dactylograms of services are described. The abnormity services can be detected by the exceptional status of the network. The system can be extended to new applications and have a good application prospect.
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present a keying Material Based key Pre-distribution Scheme, i.e., a group of users, using secret information preloaded in their memory and some public information retrieved from a keying material server, can compute a common key. We first formally define the keying material based key pre-distribution scheme in terms of the entropy, and give lower bounds on the amount of information each user has to keep secret. Then, we describe its applications for sensor networks.
Due to the deficiency of fluid-based (FB) P2P network model in dealing with the stream which could not be divided infinitely, a limitedly dividable stream-based (LDSB) model was studied and proposed for P2P streaming ...
详细信息
Due to the deficiency of fluid-based (FB) P2P network model in dealing with the stream which could not be divided infinitely, a limitedly dividable stream-based (LDSB) model was studied and proposed for P2P streaming networks. A close-form expression of maximum universal streaming rate of LDSB model was given and proved in theory. The results of theoretical analysis and numerical calculation show that the maximum universal streaming rate of LDSB model can not be greater than that of FB model because of the limitation of minimum sub streaming rate. However, with the decrease of minimum sub streaming rate, the performance of LDSB model would approximate to FB model. In addition, by choosing appropriate system parameters such as minimum sub streaming rate and server upload rate, etc., the performance of LDSB system may reach the upper limit of FB model's theoretical performance, and unnecessary waste of resources in system deployment can be avoided.
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran...
详细信息
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with random message by using the fact that the block cipher has same output with the same input using a key. Its security is proved by quantifying the advantage of distinguishing message authentication code from the random function in terms of the quality of the block cipher as a pseudo-random permutation.
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica...
详细信息
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ...
详细信息
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.
Receptor-based virtual screening becomes more and more important in novel leads design in pharmaceutical industry. However, virtual screening technology is not mature enough and still growing with the dynamic developm...
详细信息
Receptor-based virtual screening becomes more and more important in novel leads design in pharmaceutical industry. However, virtual screening technology is not mature enough and still growing with the dynamic development of related technology and science. So a flexible way to organize multiple biological algorithms and distributed chemical databases to fulfill virtual screening process is in great expect. Base on service-oriented architecture (SOA) and grid technology, we have developed a service oriented virtual screening platform that enables dynamic algorithms integrating. On which biological user can go from amino acid sequence to candidate drug hits without paying too much attention to the low-level operation, also the platform is easy to extend when new algorithms come. The receptor predicting accuracy is enhanced while effectively combining homology modeling and Ab initio method, this lead to virtual screening improvement. Through the performance test experiments, it is observed that SOA approach obtained a somewhat satisfying performance and demonstrates that SOA pattern's advantage highly surpass the performance overhead.
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape...
详细信息
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The paper analyses the behaviors of delegation in UCON based on OM-AM engineering principles, presents a formalized usage control model with delegation features using BNF Extensions, called as UCON D , and further articulates its hybrid architecture based on Client & Server Delegation Reference Monitors and relative key protocol functions. UCON D is an extension model of UCON ABC in the aspect of delegation authorization, and it resolves the delegation question of Usage Control Model. Moreover, we specify delegation procedure of an application for Digital Medium Resource Distribution System.
This paper aims at the computing-intensive problem of multiple structural alignment. After conducting analysis on progressive pairwise alignment strategy that most of the popular multiple structural alignment based on...
详细信息
This paper aims at the computing-intensive problem of multiple structural alignment. After conducting analysis on progressive pairwise alignment strategy that most of the popular multiple structural alignment based on, the paper design a parallel multiple structural alignment architecture and put it in practice. The experimental results show that this parallel architecture can obtain good results that greatly promote the computing efficiency and reusability. The parallelization method can provide helpful reference for other multiple structure alignment tools.
To well support the real-time requirement from applications, we enhance the real-time ability in Linux kernel through two new kernel mechanisms. Firstly, we present a new microsecond-level timer mechanism based on UTI...
详细信息
暂无评论