At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con...
详细信息
As traditional "Connectivity" concept from the Internet ignores the possibility of opportunistic contacts in DTNs, this paper brings time dimension into consideration, proposes Spatial-Temporal Path, Spatial...
详细信息
The existing methods of policy refinement in computernetwork defense (CND) can only support the refinement of access control policy, but not the policies of protection, detection, response, and recovery. To solve thi...
详细信息
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati...
详细信息
ISBN:
(纸本)9781849197267
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communication system. In this paper, we propose an optimal relay selective cooperation (ORSC) scheme without the acknowledgment from the destination as if it succeeds in decoding or not. The main purpose of this paper is to evaluate the performance of ORSC transmission schemes. Specifically, the closed-form outage probabilities for ORSC transmission scheme are derived. By comparing obtained outage probability of ORSC with the non-cooperation transmission scheme, we find the ORSC transmission has better performance, better reliability and significantly eliminates the impact of the carriage passing loss.
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among t...
详细信息
ISBN:
(纸本)9781849196536
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among them, frequent itemset mining is one of main research branches of stream data mining with a fundamental and significant position. In order to further advance and develop the research of frequent itemset mining, this paper summarizes its main challenges and corresponding algorithm features. Based on them, current related results are divided into two categories: data-based algorithms and task-based algorithms. According to its taxonomy, the related methods belonging to the different categories and sub-categories are comprehensively introduced for better understanding. Finally, a brief conclusion is given.
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep...
详细信息
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta...
详细信息
Complex network analysis method has recently been proposed to solve the problem of contact prediction in Delay Tolerant networks(DTNs).Centrality Estimation remains as an important issue in such *** schemes such as si...
详细信息
ISBN:
(纸本)9781467356985
Complex network analysis method has recently been proposed to solve the problem of contact prediction in Delay Tolerant networks(DTNs).Centrality Estimation remains as an important issue in such *** schemes such as single window and cumulative window centrality estimation,however,can not predict the node contact capability accurately due to the fact that the messages always have a specific lifetime associated with *** this paper we proposes a new centrality estimation method based on simplified Hidden Markov Model(HMM) to address this *** historical and current centrality information is used to compute the comparative centrality of two encountering nodes before the expiration of a *** results based on real traces show that our approach outperforms the existing schemes in terms of estimation accuracy,leading to significant improvement on delivery efficiency.
As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. To efficiently ...
详细信息
暂无评论