The explosive growth of Internet of Things (IoT) and 5G communication technologies has driven the increasing computing demands for wireless devices. Mobile edge computing in the 5G scenario is a promising solution for...
详细信息
COVID-19 virus is a major worldwide pandemic that is growing at a fast pace throughout the world. The usual approach for diagnosing COVID-19 is the use of a real-time polymerase chain reaction (RT-PCR) based nucleic a...
详细信息
Immune algorithms can improve the self-adaptability for network traffic detection. Classical immune algorithms dynamically evolve and match the whole content of immune elements. However, most features of network traff...
In this paper, an innovative pseudonym scheme based on Direct Anonymous Attestation (DAA) and Low-Density Parity-Check (LDPC) is proposed. For the sake of improving the efficiency of generating pseudonyms, the propose...
详细信息
ISBN:
(纸本)9781665430104
In this paper, an innovative pseudonym scheme based on Direct Anonymous Attestation (DAA) and Low-Density Parity-Check (LDPC) is proposed. For the sake of improving the efficiency of generating pseudonyms, the proposed scheme uses the LDPC code to encode the credential to produce more availab.e versions. To detect whether a vehicle's On-Board Unit (OBU) is compromised, the proposed scheme grants the Revocation Authority (RA) to check if the compromised OBU uses a revoked pseudonym. Compared with the existing pseudonym scheme, the proposed scheme has a higher level of security and lower computation overhead.
Immune algorithms can improve the self-adaptability for network traffic detection. Classical immune algorithms dynamically evolve and match the whole content of immune elements. However, most features of network traff...
Immune algorithms can improve the self-adaptability for network traffic detection. Classical immune algorithms dynamically evolve and match the whole content of immune elements. However, most features of network traffic are isomeric to each other. The general matching and evolution for the whole immune elements slow down the process of self-adaptability to an extent and reduce the accuracy of immune elements' evolution. In this paper, availab.e networkdata features are analysed for the network traffic detection. The section simulation method in the immune system is studied by creating a math method for part matching of immune elements which can evolve in parts. The process of section evolution for immune elements is inferred. A detection method for recognizing anomaly network traffic is proposed. Simulation experiments show that the self-adaptability of the proposed method to the real network environment is superior to that of traditional immune algorithms.
By analyzing existing ciphertext-policy attribute-based encryption scheme, ciphertext-policy weighted attribute-based encryption scheme was proposed. To solve the existing scheme without considering the attribute with...
详细信息
By analyzing existing ciphertext-policy attribute-based encryption scheme, ciphertext-policy weighted attribute-based encryption scheme was proposed. To solve the existing scheme without considering the attribute with weight, the concept of weight was adopted into ciphertext-policy attribute-based encryption scheme. Meanwhile, the security of ciphertext-policy weighted attribute-based encryption scheme was proved under the selective-weighted attribute model. Moreover, the ciphertext-policy weighted attribute-based encryption scheme was given which has effective application in secure cloud computing environment. Analysis showed that the present scheme is more appropriate for the cloud computing environment than the existing schemes.
Based on non-certificate public key cryptography, a new mobile IP(MIP) registration protocol was proposed to minimize the registration time and enhance registration performance. The protocol could realize the authenti...
详细信息
Based on non-certificate public key cryptography, a new mobile IP(MIP) registration protocol was proposed to minimize the registration time and enhance registration performance. The protocol could realize the authentication between HA and FA by using a short non-certificate signature scheme without bilinear pairings. Protocol parameters between HA and MN could be kept synchronised by reusing the initial values in the MIP registration. User anonymity could be achieved via a temporary identity transmitted by a mobile user, instead of its true identity. Random values were added to the registration messages of the mobile entity to prevent a possible replay attack. Compared with the exist protocols, the protocol could minimize the amount of calculation of HA and FA and shorten the length of the message. Moreover, it could guarantee the mutual authentications of each node, the secure distribution of secret keys and the integrity of the message.
暂无评论