Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends...
详细信息
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a...
详细信息
recently, intelligent home instruments developed fast and have been deployed widely while a crucial problem of how dealing the left devices and properties come up to the top of the water. This paper presents a remote ...
详细信息
In this paper, we propose a new operator for revising ABoxes in DL-Lite ontologies. We present a graph-based algorithm for ABox revision in DL-Lite, which implements the revision operator and we show it runs in polyno...
详细信息
in high-voltage substations, poor contacts at the junctions of contacts can generate heat leading to high temperature, arc and fire disaster in serious condition. In this paper, we present a remote temperature monitor...
详细信息
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit...
详细信息
In today's business and daily life, computers and networks are playing an increasingly important role both in the office and at home. It is desirable to individuals that any machines outside the workplace provide ...
详细信息
Secret sharing schemes have very wide applications in modern electronic society. In a secret sharing scheme, the shared secret is divided into multiple shares and only more than certain number of shares can reconstruc...
详细信息
The algorithm applied to video watermark based on the property of the video is rare recently. This article brings the video property and HVS into the video watermark,gives an new algorithm, improve the capability of t...
详细信息
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ...
详细信息
暂无评论