We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of...
详细信息
ISBN:
(纸本)9781479951529
We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of the original Kerberos protocol, firstly, we propose the usage of the Diffie-Hellman algorithm, and put the password in the token, then take the key which has added the dynamic factor as the sharing key between Client and AS, this improvement can fundamentally solve the password guessing attack. Secondly, we use the method of the ElGamal algorithm. For one thing, it will generate a new public key in each authentication, and put the new public key as the secret key of the information transmission between client and resource server, this method basically guarantees security of the information transmission; For another we use the random number, which is associated with the public key, to take the place of the time-stamp to prevent replay attack, it puts the random number and our key together to increase the ability of preventing replay attack. Finally, we analyze the example of the improvement which has been carried out. And the results show that the improved Kerberos protocol can ensure the security of the information and password.
To stimulate consumers' purchase willingness, producers must determine the reasonable selling prices and warranty length for their product. Based on the diffusion mode, a dynamic Stacklberg game of price and warra...
详细信息
To stimulate consumers' purchase willingness, producers must determine the reasonable selling prices and warranty length for their product. Based on the diffusion mode, a dynamic Stacklberg game of price and warranty was researched in this paper. Through this model, we got some conclusion about the supplier and retailer's optimal strategy.
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ...
详细信息
ISBN:
(纸本)9780955529337
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm and tbe algorithm used by DDT, tbe traditional single finger-table witch be maintained by each node in the ring will be changed into double finger-table: the Neigbbor-Finger-Table and Long-distance Finger-Table. The structure of the Neighbor-Finger-Table is the same as the traditional single finger-table's. The Long-distance Finger-Table can construct small-world network. Some similar algorithm uses random method to select remote access node, the new strategy is different from that, tbrough tbe calculation of the local node, it can ensure the scope of service can cover tbe entire network. The simulation shows the algorithm can effectively reduce the path length of service discovery, improve the service success rate, and control the path length of magnitude.
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ...
详细信息
ISBN:
(纸本)9780955529337
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is a paraDel information processing model, there are more adaptive and self-organization, and can accomplish the complexity of real-time computing and mass data retrieval, it demonstrate its unique superiority of image understanding, pattern recognition and the handling of incomplete information. The fuzzy neural network system developed by us can be used in multi- sensor image fusion. Based on our experiments, it has been proved that the fusion is fast, effective, and can meet the real-time requirements of pervasive computing.
From the viewpoint of network, large-scale computer software systems can be regarded as complex networks composed of interacting units at different levels of granularity (such as functions, classes, packages, source f...
详细信息
作者:
刘凤连孙梦尧蔡文娜Key Laboratory of Computer Vision and System
Ministry of Education of ChinaTianjin Key Laboratory of Intelligence Computing and Novel Software TechnologySchool of Computer and Communication EngineeringTianjin University of TechnologyTianjin 300384China
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effect...
详细信息
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effectively preserve the edge and detail of the image. And compared with classical methods, bilateral filtering method has a better performance in denosing for the reason that the weight includes the geometric closeness factor and the intensity similarity factor. We combine the geometric closeness factor with the weight of non-local means, and construct a new weight. Experimental results show that the modified algorithm can achieve better performance. And it can protect the image detail and structure information better.
This work analysis composition and structure of lung adenocarcinoma cells and normal cells based on confocal Raman spectroscopy. Firstly, confocal Raman spectra of 242 lung adenocarcinoma cells and 231 normal cells ar...
详细信息
As the development of mobile communication technology becomes gradual mature, the short message service which sends messages from the information platform to the mobile phone users has been a method for the most users...
详细信息
ISBN:
(纸本)9788988678251
As the development of mobile communication technology becomes gradual mature, the short message service which sends messages from the information platform to the mobile phone users has been a method for the most users to obtain information timely and conveniently. This thesis collates the short message service system exploited for the mobile phone users and the service platform for the network users to elaborate the function of the platform and the system structure of the short message platform briefly, and state the key technology of its design and operation minutely. The short message platform is consisted of a web server based on the database, a sending server and interface server. This platform employs three-level control tactics, the user, role and administrator to regulate the user's authority and guarantee the security of the system. So the system has a certain referent value for the design of such kind of short message platform.
Considering existing four expressive styles of part information, the notion of ontology and its technologies are introduced to domain ontology repository of computer Aided Process Planning (CAPP) application system, i...
详细信息
Segment-tree (ST) based cost aggregation algorithm for stereo matching successfully integrates the information of segmentation with non-local cost aggregation framework. The tree structure which is generated by the se...
详细信息
ISBN:
(纸本)9781509041183
Segment-tree (ST) based cost aggregation algorithm for stereo matching successfully integrates the information of segmentation with non-local cost aggregation framework. The tree structure which is generated by the segmentation strategy directly determines the final results for this kind of algorithms. However, the original strategy performs unreasonable due to its coarse performance and ignores to meet the disparity consistency assumption. To improve these weaknesses we propose a novel segmentation algorithm for constructing a more faithful ST with enhanced segmentation advantage according to a robust initial over-segmentation. Then we implement non-local cost aggregation framework on this new ST structure and obtain improved disparity maps. Performance evaluations on all 31 Middlebury stereo pairs show that the proposed algorithm outperforms than other five state-of-the-art aggregated based algorithms and also keeps time efficiency.
暂无评论