Now, autonomous tasks planning and allocating (TPA) in Multi Agent System (MAS) has been one key and fundamental problem to promote the intelligent level of such system. Autonomous TPA means that, all tasks should be ...
详细信息
Wireless sensor networks are often deployed in hostile environments. Protecting the communication against node capture is one of the most important design objectives. Focused on the revocations of resource constrained...
详细信息
Wireless sensor networks are often deployed in hostile environments. Protecting the communication against node capture is one of the most important design objectives. Focused on the revocations of resource constrained nodes, an efficient leveled group key management scheme is proposed. This scheme is based on a novel application of an a-ary logical key tree. Since sensor nodes may leave or join the WSN frequently, a sublevel session key is introduced to protect the sensitive information transmitted in the network. In a leave event, the rlegal sensors in the key tree are partitioned into disjointed subtrees. The group key can be updated securely by encrypting the new group key with the common keys shared by the sensors in the same subtree. When a sensor requests to join the communication group, it is assigned a sublevel session key which is used to communicate with GCKS and other legal sensors. The current session key is sent to the new sensor only after it gets the trust of GCKS. This scheme is scalable, stateless and simple to employ.
An Extending weight-balanced tree (EWB tree) for group key managements is presented. By introducing a special path in the weight-balanced key tree, the EWB tree does not cause adjustment-propagation after member addin...
详细信息
An Extending weight-balanced tree (EWB tree) for group key managements is presented. By introducing a special path in the weight-balanced key tree, the EWB tree does not cause adjustment-propagation after member adding or member deleting. The bounds ratio of the EWB tree based algorithm to that of the optimal tree shows that the bounds of EWB tree is better than those of the height-balanced 2–3 tree and equal to those of the weight-balanced 2–3 tree. The analysis also shows that the proposed scheme has fewer rekeying cost than the ones based on the weight-balanced 2–3 tree, height-balanced 2–3 tree, LTM tree and NSBHO tree.
In the above titled paper (ibid., vol. 19, no. 9, pp. 1289-1301, Sep. 09), the column under 3-DRS in Table II is incorrect due to the author's table editing error. The correct table is presented here.
In the above titled paper (ibid., vol. 19, no. 9, pp. 1289-1301, Sep. 09), the column under 3-DRS in Table II is incorrect due to the author's table editing error. The correct table is presented here.
Silicon nitride microring resonators were demonstrated as chemical sensors. The microring devices,with diameter of 100 μm, were fabricated using complementary metal oxide semiconductor(CMOS)-compatible technology, ...
详细信息
Silicon nitride microring resonators were demonstrated as chemical sensors. The microring devices,with diameter of 100 μm, were fabricated using complementary metal oxide semiconductor(CMOS)-compatible technology, and a high Q factor of 15000 was realized with free spectrum range(FSR) of 2 nm. The structures were further packaged to perform as chemical sensors, and their functionality was proved using deionized water(DI water)and ethanol as detecting mediums. Lastly, the packaged chips were used to detect glucose solutions with various concentrations, and a detection capability of refractive index change of 10–3refractive index unit(RIU) was obtained.
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information...
详细信息
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information are used to improve the performance. Evaluation on the AIMed corpus shows that our feature-based method achieves very encouraging performances of 68.6 and 51.0 in F-measure with 10-fold pair-wise cross-validation and 10-fold document-wise cross-validation respectively, which are comparable with other state-of-the-art feature-based methods.
Fabrication of microscale and nanoscale silicon waveguide devices requires patterning silicon, but until recently, exploitation of the technology has been restricted by the difficulty of forming ever-small features wi...
详细信息
Fabrication of microscale and nanoscale silicon waveguide devices requires patterning silicon, but until recently, exploitation of the technology has been restricted by the difficulty of forming ever-small features with minimum linewidth fluctuation. A technique was developed for fabricating such devices achieving vertical sidewall profile, smooth sidewall roughness of less than10 nm, and fine features of 40 nm. Subsequently, silicon microring resonator and silicon-grating coupler were realized using this technique.
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are working for expressing access policies in a formal way. But it is still an open problem. This paper defines a policy language, which is named as PDPL to express access policies and access control properties in PDAC model [1]. This language unifies ldquoBANrdquo logic with past- and future- time temporal logic. We give the syntax and semantics of PDPL, and provided some examples with their English equivalents. This logic language can express belief and authorization in access control model. And it can deal with delegations of decision-making directly. It is easy for us to formulate the properties of interest in distributed systems of PDAC model through PDPL. This logical language is part of a formal system, and it will be used in an automatic model checker in the future.
暂无评论