In the composite service which runs for a long time under the heterogeneous and loose-coupled circumstance, the failure of service tends to occur. The transaction and recovery mechanism is urgently needed in order to ...
详细信息
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse...
详细信息
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losses to system developers. This paper proposes a novel combinational logic binding technique to specially protect FPGA-based embedded systems from cloning attacks and provides a pay-per-device licensing model for the FPGA market. Security analysis shows that the proposed binding scheme is robust against various types of malicious attacks. Experimental evaluations demonstrate the low overhead of the proposed technique.
Vehicular Edge Computing (VEC) emerges as a promising paradigm by deploying computation and storage resources on edge servers located in close proximity to vehicles, such as roadside units or base stations. This proxi...
详细信息
Microservice workflows are widely used in real-time mobile computing scenarios such as face recognition and speech recognition. The key challenge is to develop efficient, stable, and robust algorithms capable of handl...
详细信息
OpenFlow provides a statistics collection scheme for per-flow and aggregate metrics at a user-specified frequency. However, periodic polling for flow statistics cannot well balance the tradeofi between measurement acc...
详细信息
We show that an aggregated Interest in Named Data networking (NDN) may fail to retrieve desired data as the Interest sent upstream in advance is recognized as a duplicate one due to its multipath forwarding and droppe...
详细信息
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate...
详细信息
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggre- gate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assump- tion.
key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a *** of these protocols are often limited to s...
详细信息
key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a *** of these protocols are often limited to simple network systems,and they may have security *** propose a general construction for key exchange protocols using smart card and password to avoid these *** constructed protocol from the general construction has only one additional communication round than the original public encryption *** construction is proven secure under random oracle model,so it can resist several common types of *** is also adapted well to various *** with related protocols,the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.
The concentration of dark matter haloes is closely linked to their mass accretion history. We utilize the halo mass accretion histories from large cosmological N-body simulations as inputs for our neural networks, whi...
详细信息
The rise of the network has injected new impetus into the development of traditional *** to the complexity of the network itself and its network programmability,there is a risk of routing loops occurring in the SDN **...
详细信息
The rise of the network has injected new impetus into the development of traditional *** to the complexity of the network itself and its network programmability,there is a risk of routing loops occurring in the SDN *** paper proposes a loop detection *** to the Time To Live(TTL)value of the loop packet,there is approximately periodicity in the same *** use sFlow to count the number of packets corresponding to each TTL value of a switch in the loop over a period of time,and perform discrete Fourier transform on the obtained finite-length sequence to observe its frequency domain performance and determine whether there are periodic *** doing so,it is determined whether there is a routing loop,and the purpose of passively detecting the routing loop is *** to existing algorithms,it has advantages in real-time,scalability and false positive *** experimental results show that the routing loop detection algorithm based on TTL statistics in this paper still maintains high judgment accuracy under the scenarios of lower stream sampling rate and smaller detection period.
暂无评论