With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr...
详细信息
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid ***,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud *** address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable ***,all the data is protected by the encryption *** privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the ***,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is *** transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing ***,we analyzed the security and fairness of the current *** the comparison with similar schemes,we have shown the advantages of the proposed scheme.
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ...
详细信息
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower bound on the sum- of-squares indicator for a balanced Boolean function satisfy- ing the propagation criterion with respect to some vectors. In this paper, if balanced Boolean functions satisfy the propaga- tion criterion with respect to some vectors, we give three nec- essary and sufficient conditions on the auto-correlation distri- bution of these functions reaching the minimum the bound on the sum-of-squares indicator. And we also find all Boolean functions with 3-variable, 4-variable, and 5-variable reaching the minimum the bound on the sum-of-squares indicator.
The patch antenna with metamaterial lens can effectively enhance the gain of the antenna. A new type of metamaterial lens is proposed in this paper, it is easy to distinguish as double negative metamaterial, presentin...
详细信息
The application of reconfigurable, programmable and cognitive radio technologies in communication systems has put forward new requirements for communication jamming decision. In this paper, the overall scheme of cogni...
详细信息
The binary phase-coded radar signal code rate estimation and code sequence retrieval are important in EW and ELINT. In this paper, the statistical autocorrelation function of the binary phase-coded radar signal is stu...
详细信息
A new airborne synthetic aperture radar (SAR) jamming-swing error phase modulation jamming is presented. The method uses the swing error of the line-of-sight SAR during the motion of the airborne SAR and modulate the ...
详细信息
In recent years, with the continuous expansion of network communication scale, the types of niche protocols and various proprietary communication protocols are increasing day by day, but botnet and various network att...
详细信息
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
most YOLO object detection neural networks prefer to focus on traditional RGB image, but previous studies rarely consider special YOLO network with compact architecture for infrared image. In this paper, we analyze or...
详细信息
暂无评论