The NAC (network Access Control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various co...
详细信息
In the telecommunication operator wireless network, the user is identifiable and centrally managed, therefore the user trust can also be centrally managed. In this paper, we propose trust cloud model based on cloud mo...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying many access points to the censored domain. Therefore they face the problem of discovering available nodes and deploying a large number of nodes. Opposite to many access point approach, we present a system building on existing overlay network, a low-cost solution for circumventing Internet, called SkyF2F. SkyF2F is a plug-in for Skype client that allows users to establish a covert communication tunnel across Skype overlay network. We describe the design, a prototype implementation and security analysis of SkyF2F. Our security analysis shows that SkyF2F can successfully circumvent several sophisticated censoring techniques.
In this paper, we present a new concept of a strong designated verifier ring signcryption scheme. We argue that this is an important cryptographic primitive that can be used to protect privacy and authenticity of a co...
详细信息
EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding ef...
详细信息
Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications....
详细信息
This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega grid operating system, short as GOS. OverFly differs from most existing publish-subscribe systems in t...
详细信息
This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega grid operating system, short as GOS. OverFly differs from most existing publish-subscribe systems in three ways. First, it introduces a message store at the client-side which enables clients to be more resilient to intermittent system faults such as intermittent network partitions and intermittent event broker errors. The client message store also enables further optimizations, such as messages packing and compression. Second, it proposes a transparent topic location and relocation design scheme, with which OverFly can tolerate permanent event broker crashes. Third, it provides a delegation model for sending and receiving messages. Besides flexibility, the delegation model can optimize system usages in single machine environments as well as interconnected environments.
The bounded degree maximum spanning subgraph problem arising from wireless mesh networks is studied *** a connected graph G and a positive integer d≥2,the problem aims to find a maximum spanning subgraph H of G with ...
详细信息
The bounded degree maximum spanning subgraph problem arising from wireless mesh networks is studied *** a connected graph G and a positive integer d≥2,the problem aims to find a maximum spanning subgraph H of G with the constraint:for every vertex v of G,the degree of v in H,d(v),is less than or equal to ***,a spanning subgraph is a connected subgraph which contains all the vertices of the original *** propose polynomial time approximation algorithms for cardinality case and edge weighted case *** input graphs are edge unweighted,a 2-approximation algorithm is *** input graphs are edge weighted,the designed algorithm always outputs a spanning subgraph whose maximum degree is no more than d+1 and weight is at least(OPT(G)/(d+2),where OPT(G) is the weight of optimal *** bounded degree spanning subgraph output by the algorithm can be used as a transport subnetwork in wireless mesh networks.
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h...
详细信息
To be effective to retain customers and enhance the marketing capabilities, it is necessary to improve the personalization of e-commerce systems. Clustering is a reliable and efficient technology to provide personal s...
详细信息
暂无评论