Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, offline and online rate is constructed based on the actual situation of P2P ...
详细信息
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, offline and online rate is constructed based on the actual situation of P2P users. The basic reproduction number that governs whether a passive worm is extinct or not is obtained. In this model, time delay consists of latent and temporary immunity periods. The impact of different parameters on this model is studied with simulation results, especially the effect of time delay, which can provide an important guideline in the control of unstructured P2P networks as well as passive worm defense.
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generaliz...
详细信息
ISBN:
(纸本)9781424443376
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generalize the GAC criterion (which was proposed by X.M. Zhang and Y.L. Zheng, in GAC-the criterion for global avalanche characteristics of cryptographic functions, Journal for Universal computer Science, 1(5): 316-333, 1995). Lower and upper bounds on the two indicators are obtained.
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us...
详细信息
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into QSS of classical messages and QSS of quantum information, QSS of classical messages can be divided into QSS of classical messages based on entanglement and QSS of classical messages without entanglement, the representative protocols in three main branches of the quantum secret sharing schemes and its latest development were introduced, also prospect analysis of the schemes' future development was given.
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ...
详细信息
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla...
详细信息
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correlation of the popular words in traffic content and network flow characteristics as input for extracting popular topics on the *** on this,this article adapts a clustering algorithm to extract popular topics and gives formalized *** test results show that this method has an accuracy of 16.7%in extracting popular topics on the *** with web mining and topic detection and tracking(TDT),it can provide a more suitable data source for effective recovery of Internet public opinions.
We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Using a combination of new and estab...
详细信息
ISBN:
(纸本)9781605584607
We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Using a combination of new and established space-saving methods, we present a full-fledged public key identification scheme, which is secure yet highly efficient. The 1024-bit scheme fits completely (including RAM) into 4682 gate equivalents and has a mean current consumption of 14.2 μA. The main novelty in our implementation is the replacement of the long pseudo-random sequence, originally stored on 260 bytes of EEPROM in [19], by a reversible stream cipher using less than 300 bits of RAM. We show how our scheme offers tag-to-reader and reader-to-tag authentication and how it can be fit into the existing RFID supply chain infrastructure. Copyright 2009 ACM.
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their pri...
详细信息
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us...
详细信息
ISBN:
(纸本)9781424451012
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
暂无评论