Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i...
详细信息
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas...
详细信息
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .
A miniature fiber-coupler-based microfluidic system is proposed for trapping of DNA biomolecules. The loop-shaped fiber-coupler is fabricated by using flame tapering technique and integrated in a microfluidic channel....
详细信息
A miniature fiber-coupler-based microfluidic system is proposed for trapping of DNA biomolecules. The loop-shaped fiber-coupler is fabricated by using flame tapering technique and integrated in a microfluidic channel. Probe-DNA immobilized on the fiber-coupler surface enables specific recognition of target DNA sequences and effectively facilitates the trapping of target DNA molecules. The binding characteristics of biomolecules on the fiber-coupler surface have been theoretically analyzed and experimentally demonstrated. Experimental results indicate that the spectral response of the loop-shaped fiber coupler immobilized with probe DNA exhibits a red-shift with the trapping of the DNA biomolecules. The proposed microfluidic system possesses such desirable merits as simple structure, label-free method and high integration, which make it a promising candidate for applications in molecular biology and related bioengineering areas.
The paper makes two contributions to the study of A/V streaming service: (1) introduces a service management mechanism for monitoring and controlling resource utilities to enhance quality of service guarantees;(2) imp...
详细信息
The paper makes two contributions to the study of A/V streaming service: (1) introduces a service management mechanism for monitoring and controlling resource utilities to enhance quality of service guarantees;(2) improves the security of A/V streaming service and reduces the complexity of encryption computations by applying CORBA security services in conjunction of the wavelet compression and encryption technology for multimedia data. An improved CORBA A/V streaming service prototype is implemented based on ORBUS which is a real-time CORBA ORB, and its application in networked manufacturing system is also discussed.
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(W...
详细信息
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual...
详细信息
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate users on the other side of the STAR-RIS. We utilize an integrated architecture that combines the fully-connected(FC)-RIS, an emerging type of beyond-diagonal(BD)-RIS, with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR) schemes to strike a balance between sensing and communications performance. Thereafter, observing the security-reliability performance tradeoff of the downlink ISAMC, we conduct closed-form analyses to compare COPs of round-robin scheduling(RS) and multiuser scheduling(MS) with the aid of a TS-based STAR-FC-RIS. Furthermore, we derive closed-form expressions of the sensing outage probability, communications outage probability(COP), and communications intercept probability, where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA) of the *** results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security. Moreover, an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s...
详细信息
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a secondary user packet waiting in the buffer may leave the system due to impatience before it is transmitted,and this impatient behavior inevitably has an impact on the system *** to investigate the influence of the aggregate behavior of requests and the likelihood of impatience on a dynamic spectrum allocation scheme in CRNs,in this paper a batch arrival queueing model with possible reneging and potential transmission interruption is *** constructing a Markov chain and presenting a transition rate matrix,the steady-state distribution of the queueing model along with a dynamic spectrum allocation scheme is derived to analyze the stochastic behavior of the ***,some important performance measures such as the loss rate,the balk rate and the average delay of secondary user packets are ***,system experiments are carried out to show the change trends of the performance measures with respect to batch arrival rates of secondary user packets for different impatience parameters,different batch sizes of secondary user packets,and different arrival rates of primary user ***,a pricing policy for secondary users is presented and the dynamic spectrum allocation scheme is socially optimized.
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in...
详细信息
Password authenticated key exchange protocols allow two entities who only share a humanmemorable password to authenticate each other and agree on a session key between themselves. This paper surveys the state of resea...
详细信息
Runtime performance seriously bothers application developers and users for wearable devices such as Apple Watch and Google Glass. To ease such pains, one approach is to transplant the computation to the cloud, known a...
详细信息
ISBN:
(纸本)9781479959532
Runtime performance seriously bothers application developers and users for wearable devices such as Apple Watch and Google Glass. To ease such pains, one approach is to transplant the computation to the cloud, known as cloud offloading. This paradigm works well when the Internet is accessible. Another solution, known as device-to-device (D2D) offloading, is to utilize nearby devices for computation offloading. In this paper, propose the Dust, a D2D code offloading prototype for wearable computing. To our best knowledge, Dust is the first code offloading system for wearable computing with an implementation on Google Glass. Dust includes a programmer friendly framework based on Java annotation, a lightweight offloading service, and a runtime task scheduler to make offloading decisions. Extensive experiments demonstrate that Dust achieves real-time performance with speedup of 6.1X.
暂无评论