The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with the bundle protocol of Delay/Disruption Tolerant networks (DTNs). Some bundles which may be error are requested to retransmit in next communication link. An r-uniform random hypergraph model is introduced and the relation is analyzed between the probability of error bundle and the structure of hypergraph.
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th...
详细信息
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on the properties of Maiorana-McFarland's Bent functions, a Bent function with arbitrary degree can be constructed by changing the order of concatenating linear functions.
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as...
详细信息
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted computing and virtualization technology. On the service provider's platform, from the very beginning of Virtual Machine Monitor (VMM) was booted to the execution environment was set up, all of the platform status changes has been recorded into Platform Configuration Register (PCR) and reported to remote service requester, which make it sure about the trustworthy of the result. Furthermore, the VM image was leveraged to make the execution environment constructed more flexible. Analysis shows our method is efficient and secure.
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one which can be decrypted by Bob, without the proxy knowing the corresponding plaintext. Many kinds of ...
详细信息
A video watermarking robust algorithm based SVD is proposed. In order to analyze both the spatial and temporal characters of video sequence, each frame of the video is transformed to wavelet domain by 2-D DWT, and the...
详细信息
A video watermarking robust algorithm based SVD is proposed. In order to analyze both the spatial and temporal characters of video sequence, each frame of the video is transformed to wavelet domain by 2-D DWT, and then 1-D DCT is used along the temporal axis. Watermarks were embedded into the singular values (SVs) of the coefficient frames and in the extraction procedure watermarks can be detected without the original video or any other information of the original singular values. Experiments show that the watermarked frames are indistinguishable from the original frames subjectively and the algorithm bears desirable robustness on filtering, additive noise, lossy compression, rotation and synchronization attacks etc.
The resource utility and network throughput are both the key challenges in wireless multi-hop network. In this paper, by introducing the idea of cross-layer design and its cooperative mechanism, a multi-constrained op...
详细信息
The resource utility and network throughput are both the key challenges in wireless multi-hop network. In this paper, by introducing the idea of cross-layer design and its cooperative mechanism, a multi-constrained optimization scheme is proposed. The proposed scheme combines the energy threshold in the physical layer and the channel capacity in the link layer and integrates the advantage of tight coupling and loose coupling methods. The bargaining game theory is applied to analyze the bargaining behavior of nodes in the network. The simulation results show the proposed optimization scheme can efficiently improve the fairness and utility of the resource in the network.
Blaze et *** 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's pubLic key into one that can be opened under Bob's decryption key. Bu...
详细信息
Blaze et *** 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's pubLic key into one that can be opened under Bob's decryption key. But until now, the problem of constructing a constant-size CCA-secure multi-hop proxy re encryption scheme remain opem In this paper, we try to solve this open problem by presenting a somewhat constantsize CCAsecure multi-hop proxy re-encryption scheme.
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a...
详细信息
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated or...
详细信息
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated organization, high search cost and maintenance overhead make them less practicable. To avoid these weaknesses, in this paper, we propose an adaptive and efficient method for search in unstructured P2P networks, the Semantic Inference Search method (SIS). This approach is based on a simple and powerful principle similar to interest-based locality. It utilizes feedback of not only the requested objects but also semantically related objects from previous searches. It applies Bayesian network to establish an inference model, using semantic inference to direct future searches. Experimental results show that the SIS method achieves high success rate, more discovered objects, low bandwidth consumption, less maintenance and adaptation to changing network topologies.
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem...
详细信息
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure scheme for storage overlay networks is proposed by applying erasure coding technique to reduce redundancy and enhance privacy protection. For achieving a lightweight data privacy protection, encoded strips are stored and dual distinct hash functions are deployed to construct hash chains to protect location information for encoded strips. Simulation results show that with different percentage of malicious peers, by adjusting encoding parameters, the scheme is available to provide durable data storage service.
暂无评论