The copyright protection of digital content is one of the aims of digital right management (DRM), among which digital watermarking is one of the key supporting technologies. This paper proposes a robust zero-watermark...
详细信息
Feature extraction for individual communication transmitter identification is one of the major issues in the identifying process. A neighborhood rough set is proposed in this paper, in order to search for the good fea...
详细信息
Polyspectral feature extraction is considered to be a potential method for individual communication transmitter identification. However, the curse of dimensionality caused by higher orders of the features restrains th...
详细信息
The NAC (network Access Control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various co...
详细信息
In the telecommunication operator wireless network, the user is identifiable and centrally managed, therefore the user trust can also be centrally managed. In this paper, we propose trust cloud model based on cloud mo...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying many access points to the censored domain. Therefore they face the problem of discovering available nodes and deploying a large number of nodes. Opposite to many access point approach, we present a system building on existing overlay network, a low-cost solution for circumventing Internet, called SkyF2F. SkyF2F is a plug-in for Skype client that allows users to establish a covert communication tunnel across Skype overlay network. We describe the design, a prototype implementation and security analysis of SkyF2F. Our security analysis shows that SkyF2F can successfully circumvent several sophisticated censoring techniques.
In this paper, we present a new concept of a strong designated verifier ring signcryption scheme. We argue that this is an important cryptographic primitive that can be used to protect privacy and authenticity of a co...
详细信息
EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding ef...
详细信息
Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications....
详细信息
This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega grid operating system, short as GOS. OverFly differs from most existing publish-subscribe systems in t...
详细信息
This paper presents OverFly, a large-scale publish-subscribe system developed to support our grid middleware, Vega grid operating system, short as GOS. OverFly differs from most existing publish-subscribe systems in three ways. First, it introduces a message store at the client-side which enables clients to be more resilient to intermittent system faults such as intermittent network partitions and intermittent event broker errors. The client message store also enables further optimizations, such as messages packing and compression. Second, it proposes a transparent topic location and relocation design scheme, with which OverFly can tolerate permanent event broker crashes. Third, it provides a delegation model for sending and receiving messages. Besides flexibility, the delegation model can optimize system usages in single machine environments as well as interconnected environments.
暂无评论