In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ...
详细信息
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles.
Recently,finite-time and fixed-time stability has been a hot topic in the study of dynamical *** this paper,we will provide an insightful view on this issue and explore the intrinsic property by mathematical *** theor...
详细信息
ISBN:
(纸本)9781509009107
Recently,finite-time and fixed-time stability has been a hot topic in the study of dynamical *** this paper,we will provide an insightful view on this issue and explore the intrinsic property by mathematical *** theorems and corollaries show how to find the settling ***,we apply the corresponding theory on the finite-time and fixed-time synchronization problem of nonlinearly coupled systems and a numerical simulation is also given to demonstrate its efficiency.
A highly sensitive refractive index (RI) sensor was designed utilizing gold-coated PCF. The properties of modes coupling between fundamental mode and SPP were theoretically simulated. The maximum RI sensitivity of 840...
详细信息
A solid-state green-light-emitting upconversion coherent random laser was realized by pumping macroporous erbium-doped lithium niobate with a 980 nm laser. The lasing threshold was determined to be about 40 k W∕cm~**...
详细信息
A solid-state green-light-emitting upconversion coherent random laser was realized by pumping macroporous erbium-doped lithium niobate with a 980 nm laser. The lasing threshold was determined to be about 40 k W∕cm~*** the threshold, the emission intensity increased sharply with the increasing pump intensity. Moreover, a narrow multi-peaks structure was observed in the green-light-emission band, and the positions of lasing lines were various at different angles. The results were the direct evidences of coherent random lasing emission from macroporous erbium-doped lithium niobate. These phenomena were attributed to the coexistence of upconversion emission and a multiple scattering feedback mechanism.
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering tech...
详细信息
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering techniques to defeat and evade state-of-the-art analyzers. Therefore, to prepare for unknown attacks, studying malware analysis techniques is insufficient. More importantly, we should study new antianalysis techniques for malware. This paper expands the concept of anti-analysis malware and defines a type of intention-unbreakable malware(IUM). To help defenders fully understand and establish a defense system against the new security threats, this paper systematically discusses IUM from the perspectives of threat discovery, threat modeling, attribute analysis, and threat assessment; in addition, this study also provides the Po C implementations of IUM and demonstrates how attackers can use this type of malware to evade advanced security analysis, that is, accurate identification of target(class) victims and intention concealment in reaching non-target(class) victims. Finally, this paper provides several mitigation directions for combating IUM.
In this paper a distributed weight mining algorithm is proposed based on FP-growth. As an important part of network fault management, the association rule takes effect on eliminating redundant alarms and preventing al...
详细信息
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a...
详细信息
With the Internet and mobile communications becoming an indispensable part of people's daily lives, online transactions have become one of the most common payment methods. However, transaction fraud incidents also...
详细信息
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and para-llelism is the key to continued performance scaling in modern microprocessors. In this paper, the achiev...
详细信息
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of clus...
详细信息
ISBN:
(纸本)9781595939036
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of cluster system software stack to evaluate its design methodology, including code reusability, evolveability, adaptability and manageability. According to the four criteria, we have proposed a management service-based layered design methodology and built a complete cluster system software stack for both scientific and business computing. Our practices and evaluations show our design methodology has advantages over others in terms of the proposed criteria. Copyright 2007 ACM.
暂无评论