The tunable omnidirectional surface plasmon resonance in the optical range is theoretically demonstrated in a cylindrical plasmonic crystal by using rigorous coupled-wave analysis. The cylindrical plasmonic crystal co...
详细信息
The tunable omnidirectional surface plasmon resonance in the optical range is theoretically demonstrated in a cylindrical plasmonic crystal by using rigorous coupled-wave analysis. The cylindrical plasmonic crystal consists of an infinite chain of two-dimensional cylindrical metal-dlielectric-dielectric-metal structures. The dispersion relation of the cylindrical plasmonic crystal is obtained by calculating the absorptance as a function of a TM- polarized incident plane wave and its in-plane wave vector. The omnidirectional surface plasmon resonance can be tuned from UV region to visible region by adjusting the thickness of the cylindrical dielectric layers. The absorption spectrum of the infinite chain of nanocylinders is also investigated for comparison.
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints, it is ...
详细信息
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio...
详细信息
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryption approach. In this paper, an efficient certificate-based signcryption scheme based on bilinear pairings is proposed. As compared to traditional and identity-based signcryption schemes, the proposed scheme has the following advantages: it provides implicit certification;it does not have the private key escrow feature of identity-based signcryption schemes, we also analyze the proposed scheme from security and performance points of view.
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sens...
详细信息
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sensors, it is usually impractical to directly monitor each node or link in wireless sensor network. We consider the problem of inferring the internal link loss characteristics from passive end-to-end measurement in this paper. Specifically, the link loss performance inference during the data aggregation is considered. Under the assumptions that the link losses are mutually independent, we elaborate a bias corrected link loss Cumulant Generating Function (CGF) algorithm. The simulation results show that the internal link loss CGF can be inferred accurately comparable to the sampled internal link loss CGF. At the end of this paper, we apply the result of internal link loss CGF inference to identify the lossy link in sensor network.
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel...
详细信息
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.
Signature, encryption and key exchange are some of the most important and foundational cryptographical tools. In most cases, they are all needed to provide different secure functions. There exist called authenticated ...
详细信息
This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to m...
详细信息
This paper proposes a unified dynamic relation tree (DRT) span for tree kernel-based semantic relation extraction between entity names. The basic idea is to apply a variety of linguistics-driven rules to dynamically p...
详细信息
This paper proposes a unified dynamic relation tree (DRT) span for tree kernel-based semantic relation extraction between entity names. The basic idea is to apply a variety of linguistics-driven rules to dynamically prune out noisy information from a syntactic parse tree and include necessary contextual information. In addition, different kinds of entity-related semantic information are unified into the syntactic parse tree. Evaluation on the ACE RDC 2004 corpus shows that the unified DRT span outperforms other widely-used tree spans, and our system achieves comparable performance with the state-of-the-art kernel-based ones. This indicates that our method can not only well model the structured syntactic information but also effectively capture entity-related semantic information.
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at a lower computational costs and communication overheads than the signature-then-encryption approac...
详细信息
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at a lower computational costs and communication overheads than the signature-then-encryption approach. Recently, two identity-based threshold signcryption schemes [12], [27] have been proposed by combining the concepts of identity-based threshold signature and signcryption together. However, the formal models and security proofs for both schemes are not considered. In this paper, we formalize the concept of identity-based threshold signcryption and give a new scheme based on the bilinear pairings. We prove its confidentiality under the Decisional Bilinear Diffie-Hellman assumption and its unforgeability under the Computational Diffie-Hellman assumption in the random oracle model. Our scheme turns out to be more efficient than the two previously proposed schemes.
Supply chain management is the major field for RFID application. However, little work has been conducted to address the security issues in this context. Existing RFID solutions cannot be applied directly in this field...
详细信息
Supply chain management is the major field for RFID application. However, little work has been conducted to address the security issues in this context. Existing RFID solutions cannot be applied directly in this field because of a set of special RFID security requirements to be addressed for supply chain management. The major contribution of this paper is to identify the unique set of security requirements for secure RFID communications in supply chains, propose a universally composable model that satisfies the security requirements, and design a lightweight protocol that realizes the universally composable model. This paper further defines the security requirement of unlinkability, and classifies the typical RFID protocols according to the security requirements.
暂无评论