While there has been considerable progress in the research and technological development ( RTD) of the Internet of Things (IoT), there is still considerable RTD required by international communities for the trust, pri...
详细信息
ISBN:
(纸本)9781450318228
While there has been considerable progress in the research and technological development ( RTD) of the Internet of Things (IoT), there is still considerable RTD required by international communities for the trust, privacy and security research challenges arising from the constitution of the IoT architectures, infrastructures, communications, devices, objects, applications and services. In this paper, we present an thorough analysis of the ongoing and future RTD work, specifically in Europe, regarding trust, privacy and security of the Internet of Things with a view towards enabling international cooperation efforts around the globe to solve these major research challenges. Copyright 2012 ACM.
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ...
详细信息
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time.
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private inf...
详细信息
ISBN:
(纸本)9781467321006
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private information which means no one of them would learn more information than what can be deduced from the *** design some methods to compute union,intersection and element reduction operations effectively and securely and apply these techniques to solve the multiset operations problems in semi-honest setting and consider their extension to the malicious setting.
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req...
详细信息
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user requirements to implement ecommerce activities like automated *** difficulty lies in the uncertainty of user preferences that include uncertain description and contents,non-linear and dynamic *** this paper,fuzzy language was used to describe the uncertainty and combine with multiple classified artificial neural networks(ANNs) for self-adaptive learning of user *** refinement learning results of various negotiation contracts' satisfaction degrees in the extent of fuzzy classification can be *** to unclassified computation,the experimental results illustrate that the learning ability and effectiveness of agents have been improved.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
The recent IEEE 802.16j-2009 adds multi-hop relay capabilities to IEEE 802.16 systems, which aims to offer improved coverage and capacity over single-hop radio access systems. In this paper, we point out several secur...
详细信息
With the rapid development of information technology, the secrutiy problems of information systems are being paid more and more attention, so the Chinese government is carrying out informationsecurity classified prot...
详细信息
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ...
详细信息
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop...
详细信息
International business intelligence processing is an important problem of cross-disciplinary research in artificial intelligence. The recognition of Out-Of-Vocabulary (OOV in short) in international commercial activit...
详细信息
暂无评论