To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks'protocol and furth...
详细信息
ISBN:
(纸本)9781424451012
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks'protocol and furthermore it solves the abuse using off-line trusted third party (TTP). The security and fairness are also possessed in the protocol.
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an...
详细信息
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a...
详细信息
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the authors presented an attack-tolerant node localization algorithm called AtLoc. In AtLoc, a least safe reference set was randomly built up according to the unbiased estimation of variance. Based on this, prediction residual of the least safe reference set was used to stepwise diagnose the remained references were abnormal or not, which significantly enhanced the resilience of localization system against attacks. Finally, the authors provided theoretical analysis and simulations to evaluate the proposed techniques.
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming...
详细信息
ISBN:
(纸本)9781424431212
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming framework for flow-jamming attacks, providing a foundation for the design of future protocols to mitigate flow-jamming. We propose metrics to evaluate the effect of a flow-jamming attack on network flow and the resource expenditure of the jamming adversary. We develop, evaluate, and compare a variety of flow-jamming attacks using the proposed metrics and the linear programming formulation. In addition, we formulate two approaches for distributed flow-jamming attacks for a set of jammers operating without centralized control and compare the performance to the centralized attacks using the linear programming formulation.
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights p...
详细信息
ISBN:
(纸本)9781424441969
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights policy by using DRM agent. First, descriptions of extensible ODRL-based rights transfer policy were presented to complete OMA REL. Then, we introduced a remote attestation mechanism among entities, such as RI and DRM agent, based on trusted computing platform in order to implement trusted distribution and enforcement of the policy, also mainly proposed trustworthy distribution protocols of the rights object and transfer, as well as a trusted policy enforcement protocol. Final, the approach is made comparison with existing DRM schemes as to several functionality aspects on transferable rights granularity, restricted sharing, temporal limitation, trust of DRM agent. A conclusion is drawn that the proposed scheme is not restricted within local domain environment, and accomplishes fine-grained rights transfer and contents sharing between users without direct participations of rights issuer or local domain manager.
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result...
详细信息
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result shows that this stream cipher structure has potential security weakness when the design of the filter Boolean function is improper.
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault dete...
详细信息
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault detection modules. The notion of threshold Byzantine Quorum system (TBQS) was presented grounded on this architecture. TBQS can be used together with erasure coding or threshold schemes to design survivable storage systems. Storage systems based on TBQS can tolerant 1/4 faulty nodes and thus provide a solid data service.
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video...
详细信息
ISBN:
(纸本)300018726X
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video frame. To deal with this kind of packet losses, an error concealment algorithm in the H.264 decoder for whole-frame losses, which is based on a minimum motion vector span, is proposed in this paper. The motion vectors of lost frame are predicted by utilizing the principle of optical flow, and then the lost frame is reconstructed based on the minimum motion vector span. Experimental results on several test sequences show that the proposed approach can effectively reconstruct the lost frame, both in better objective and subjective image quality.
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presente...
详细信息
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a “man-in-the-middle” attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or Disruptions occur ...
详细信息
暂无评论