In current version of Trusted Network Connection (TNC) architecture, IF-MAP protocol creates a structured way to support real-time data interchange and dynamic management. However, there is a big challenge that the MA...
详细信息
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol...
详细信息
The Programming language for symmetric cryptographic algorithms (PLSCA) is proposed. The detailed specification of the syntax of PLSCA is presented, and the cipher of IDEA is described using PLSCA as an example. Using...
详细信息
The Programming language for symmetric cryptographic algorithms (PLSCA) is proposed. The detailed specification of the syntax of PLSCA is presented, and the cipher of IDEA is described using PLSCA as an example. Using PLSCA, the cryptography designers could describe the structure of symmetric cryptographic algorithms in a formal way, exchange their ideas and algorithm details, test and analyze the symmetric cryptographic algorithms conveniently and rapidly. PLSCA may improve the testing efficiency of new algorithms. It is adapt to assist the design and automatic analysis for symmetric cryptographic algorithms, and it may be used as a standard language to submit new algorithms to the evaluation staff.
Proxy signature is an important cryptographic primitive and has been suggested in numerous applications, Tne revocation oI delegated rights is an essential issue of the proxy signature schemes. In this article, a secu...
详细信息
Proxy signature is an important cryptographic primitive and has been suggested in numerous applications, Tne revocation oI delegated rights is an essential issue of the proxy signature schemes. In this article, a security model of proxy signature schemes with fast revocation is formalized. Under the formal security framework, a proxy signature scheme with fast revocation based on bilinear pairings is proposed. A security mediator (SEM), which is an on-line partially trusted server, is introduced to examine whether a proxy signer signs according to the warrant or he/she exists in the revocation list. Moreover, the proxy signer must cooperate with the SEM to generate a valid proxy signature, thus the proposed scheme has the property of fast revocation. The proposed scheme is provably secure based on the computational Diffie-Hellman (CDH) intractability assumption without relying on the random oracles, and satisfies all the security requirements for a secure proxy signature.
In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral ***,in this paper,propose an eff...
详细信息
In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral ***,in this paper,propose an efficient three-phase framework and corresponding algorithms for dealing with this ***,a greedy scheduling algorithm based on the lower bound of the ergodic rate is performed for generating an elementary cluster in the first *** then the elementary cluster is divided into many small clusters according to the following proposed algorithms based on the short term instantaneous information in the second *** the end,based on the limited feedback two zero-forcing(ZF) precoding strategies are adopted for reducing the intra-cluster interference in the third *** provided Monte Carlo simulations show the effectiveness of our proposed algorithms in the respect of system spectral efficiency and average user rate.
Recently, several impossible differential attacks on the Advanced encryption standard (AES) were presented. The previous work is extended by presenting a new impossible differential attack on the AES-128 (with 128 bit...
详细信息
Recently, several impossible differential attacks on the Advanced encryption standard (AES) were presented. The previous work is extended by presenting a new impossible differential attack on the AES-128 (with 128 bit secret key) reduced to 7 rounds. Moreover, our result shows that impossible differential attack on the AES-128 reduced to 7 rounds requires 2 115.5 chosen plaintexts, 273 memory, and 2105 seven-round AES-128 encryptions, and works by exploiting weakness in the AES key schedule.
The opportunistic cooperation schemes,where only the "best" relay is selected to forward the message,have been widely investigated recently for their good performance in terms of outage ***,the unfair select...
详细信息
The opportunistic cooperation schemes,where only the "best" relay is selected to forward the message,have been widely investigated recently for their good performance in terms of outage ***,the unfair selections of relays may cause unbalance power consumptions among relays,which reduces the lifetime of energy constrained *** this paper,we introduce a novel concept of outage priority based fairness(OPF),aiming at improving the selection fairness among relays appropriately without outage performance ***,a cooperation scheme is proposed to meet this concept,and corresponding theoretical analysis is also ***,based on OPF,the achievable upper bound of the fairness is derived,and an optimal cross-layer designed scheme is also provided to achieve the *** simulations are carried out finally,which not only validate the theoretical analysis,but also show that taking advantages of the proposed schemes,the fairness among all relays,as well as the network lifetime,can be greatly improved without any loss of outage performance,especially in high SNR regime.
SONICUMOS is an enhanced behavior-based face liveness detection system that combines ultrasonic and video signals to sense the 3D head gestures. As face authentication becomes increasingly prevalent, the need for a re...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ...
详细信息
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an...
详细信息
暂无评论