information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on researches on multisignature and proxy signature, we present a new type of signature...
详细信息
ISBN:
(纸本)1846000025
information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on researches on multisignature and proxy signature, we present a new type of signature: Multisignature with proxy, in which some signers can delegate their proxies to do the signatures. The common multisignature and the proxy multisignature are specific to this signature. Two new schemes of multisignatures mingled with proxy signers are introduced in this paper, and their security issues are analyzed as well.
Modeling the intrusion is an open problem which is necessary to be solved in Intrusion Tolerance System. A model of state transition and its constructing algorithm is presented which is described with the capability o...
详细信息
In recent years, internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the internet. So people began to find methods to detect worms as quickly ...
详细信息
This paper presents Ubicast, an enhanced application-level multicast protocol. Ubicast is built upon Pastry, a scalable and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applicat...
详细信息
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica...
详细信息
In this paper, the constructions of cheating immune secret sharing and multisecret sharing are studied. Based on the theories of matrix and linear block codes over finite field, some new methods to construct cheating ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
In high-speed Internet links, an effective and efficient packet sampling technology in traffic measurement becomes more and more indispensable for its benefits of reducing data quantity and saving various resources. W...
详细信息
ISBN:
(纸本)0780390156
In high-speed Internet links, an effective and efficient packet sampling technology in traffic measurement becomes more and more indispensable for its benefits of reducing data quantity and saving various resources. We address the issue of how to keep or improve sampling accuracy during burst or fluctuation periods. In the paper, an adaptive packet-level sampling method on different traffic fluctuation and burst scales is proposed. The method can dynamically adjust each packet sampling probability dependent on the magnitude of traffic fluctuation. The adjustment granularity is fine because it reaches a single packet. By contrast to the static random sampling method in experiments using real traffic traces, we show that the proposed adaptive sampling has a great capability to trace traffic fluctuations and improve sampling accuracy through capturing more fluctuation or burst details.
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges...
详细信息
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges. Because they are not suitable for the WSN systems which have low computational power and limited memory size. To get an efficient broadcast authentication protocol, the traditional μTESLA and multi-level μTESLA are utilized and studied. The problems of these protocols are pointed out. Then E-μTESLA is presented on the basis of 2-level μTESLA. At the end, the performances of E-μTESLA are compared with m-level E-μTESLA. The comparison results show that E-μTESLA is more efficient in less computational power, and less storage memory than those of m-level E-μTESLA.
暂无评论