In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement *** this mechanism a single user,whose attributes satisfy the predicate,endorses the *** signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the *** security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol...
详细信息
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching t...
详细信息
ISBN:
(纸本)9788988678213
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a model checking algorithm for this logic.
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and...
详细信息
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and periodical key updating. This scheme offers a set of methods for key distribution and updating with MLD snooping mechanism and MLD report filtering on access switches. This method reduces the complexity of the key updating problem when members leave the group by layer 2 control and guarantees the efficiency and security of key management. Compared with other schemes, this scheme performs better on computation cost and communication cost than them and has acceptable storage cost.
In IEEE 802.11e EDCA wireless LANs, the capability of AP for channel access is equivalent to those of ordinary stations, which makes it hard to satisfy the throughput and delay requirements of AP downlink traffic unde...
详细信息
In IEEE 802.11e EDCA wireless LANs, the capability of AP for channel access is equivalent to those of ordinary stations, which makes it hard to satisfy the throughput and delay requirements of AP downlink traffic under heavy load conditions. Taking the delay constraints of real-time traffic into consideration, an improved EDCA scheme was proposed to enhance AP downlink access provisioning. The essential mechanism is called Push-on-Demand operation which shall be trigged if there are too many frames accumulated in AP's transmission queues, or the queueing time of a real-time frame appears too long to satisfy the service requirements. While in Push state, AP can access channel directly to transmit frames, bypassing the contention window-based backoff procedure. To resolve the collisions between contending ACs within AP, interior collision scheduler is designed deliberately, and Push-Deferred state is defined further to protect wireless channel against greedy external traffic. Simulation results show that the proposed EDCA scheme enhances effectively the capability of AP for channel access, leading to improved downlink access provisioning in IEEE 802.11e wireless LANs.
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement ...
详细信息
ISBN:
(纸本)1891706268
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement relation between ZIAs with finite domain.
Currently most of the high-bandwidth internet applications use both P2P technology and application-layer multicast technology. Considering the loose coupling between the P2P technology and application-layer multicast ...
详细信息
Studying the features of network traffic is a necessary method in many applications such as managing and monitoring the network, detecting network attack etc. Due to the non-stationary and random characteristics of th...
详细信息
In text categorization, vectorizing a document by probability distribution is an effective dimension reduction way to save training time. However, the data sets that share many common keywords between categories affec...
详细信息
A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman *** semi-bent functions are Boolean functions with four trace ***,it is shown that the algebraic degree...
详细信息
A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman *** semi-bent functions are Boolean functions with four trace ***,it is shown that the algebraic degrees of the new semi-bent functions attain the maximum values.
暂无评论