We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak...
详细信息
ISBN:
(纸本)9788988678251
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our IB-HPS scheme, we construct directly an efficient leakage-resilient identity-based encryption(IBE) scheme in the model.
In order to improve the performance of the region texture spectrum descriptors, an improved operator, called ID-LBP is discussed firstly. Then, three rotation invariant texture descriptors, named CS-LBPV, D-LBPV and I...
详细信息
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir...
详细信息
ISBN:
(纸本)9781424472369
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requirement and FSM (Finite State Machine) to verity the safety requirements of the specification. The device specifications of railway interlocking system are modeled with UML, and dynamic behaviors of the device and whole system are modeled with FSM, the safety specification is translated LTL (Linear Temporal Logic) and analyzed with NuSMV. We try to show the feasibility of improving the reliability and reducing revalidation efforts when designing and developing a decentralized railway signaling system.
The early-age hydration of Portland cement paste has an important impact on the formation of microstructure and development of ***,manual derivation of hydration kinetic equation is very difficult because there are mu...
详细信息
The early-age hydration of Portland cement paste has an important impact on the formation of microstructure and development of ***,manual derivation of hydration kinetic equation is very difficult because there are multi-phased,multi-sized and interrelated complex chemical and physical reactions during cement *** this paper,early-age hydration kinetic equation is reversely extracted automatically from the observed time series of hydration degree of Portland cement using evolutionary computation method that combines gene expression programming and particle swarm optimization *** order to reduce the computing time,GPUs are used for acceleration in *** have shown that according to the extracted kinetic equation,simulation curve of early-age hydration is in good accordance with the observed experimental ***,this equation still has a good generalization ability even changing chemical composition,particle size and curing conditions.
Application of multi-objective optimization method, the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment environment. Proposed the use of ...
详细信息
The texture spectrum descriptors, center-symmetric local binary pattern (CS-LBP) and its extension D-LBP are effective for region description. However, they discard the low frequency information of a region. A novel i...
详细信息
This paper deals with two risk management tools and their application on Economical crisis management. Next points out some problems in their research and application and the direction of research, introduced some con...
详细信息
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakne...
详细信息
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record *** this technology the useful knowledge is extracted and the scientific and auxiliary de...
详细信息
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then...
详细信息
暂无评论