This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa...
详细信息
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to message blocks. On the assumptions of EDDH problems, the proposed scheme is secure against chosen-ciphertext attacks and existentially unforgeable against the chosen- message attacks in the random oracle model.
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev...
详细信息
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When...
详细信息
Application environment is the necessary condition for an application system running. If the application environment can be trusted, then the application system could run safely and reliably. This paper firstly analyz...
详细信息
The technique of high-speed network data stream capture has been a main topic of network research. This paper finds out some key technical problems that exist on high-speed network data stream capture and makes some i...
详细信息
Providing security for wireless sensor networks is challenging due to the resource limitations of sensor nodes. Leveraging the broadcast nature of wireless communication, we propose a behavior-based approach for attac...
详细信息
The performance of transmit antenna selection is investigated. The exact closed-form expressions for the average BER and average SNR in MRT systems and EGT systems are proposed. The minimum number of increased transmi...
详细信息
A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger ...
详细信息
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is prop...
详细信息
ISBN:
(纸本)9781424479573
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is proposed in this paper. In this model, the circular queue structure is used in the dynamic shared memory buffer pool, which has improved the storage efficiency of real-time data flow;the circular queue data storage structure and an improved B+ tree index structure are used in the hard disk, which has solved the problem that how to store new data when the storage space is full, and improved the data retrieval efficiency in some degree. Test results show that this model has better data storage capacity and faster data retrieval speed.
暂无评论