How to judge the relationship between mobile short messages is the keytechnology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of...
详细信息
How to judge the relationship between mobile short messages is the keytechnology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of different SMS topic feature words is analyzed. Then a computing method of the association degree between different SMS feature words is proposed, which is based on leverage formula. The experimental results show that this method can effectively calculate the association degrees between SMS feature words, which could help to extract hot topics in corpus of a mess of short messages.
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying many access points to the censored domain. Therefore they face the problem of discovering available nodes and deploying a large number of nodes. Opposite to many access point approach, we present a system building on existing overlay network, a low-cost solution for circumventing Internet, called SkyF2F. SkyF2F is a plug-in for Skype client that allows users to establish a covert communication tunnel across Skype overlay network. We describe the design, a prototype implementation and security analysis of SkyF2F. Our security analysis shows that SkyF2F can successfully circumvent several sophisticated censoring techniques.
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance abilit...
详细信息
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance ability? Third, which type of topologies is more efficient in tolerating nodefailure?.
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit...
详细信息
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu...
详细信息
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granularity of categorization were too coarse. With an analysis of the characteristics of adult short messages, and considering the effectiveness and real time performance of filtering algorithm, this paper proposes an adult short message discriminating algorithm based on adultism-degree computation, and a threshold selecting algorithm based on close test optimization. Experiments show that the proposed algorithm can effectively discriminate adult short message with a 94.4% correction rate, meanwhile it can meet the requirements of practical processing.
network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management,...
详细信息
network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management, networksecurity, etc. and finding video stream from the network flow is the precondition and foundation. This paper analyzes the characteristics of the video stream packets, and draws a conclusion that each network video stream type can be labeled uniquely by one characteristic string, based on which, we can find video streams in network flow easily. The experiment results show that the method is able to find network video streams accurately.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ...
详细信息
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener...
详细信息
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key generator (PKG) can easily impersonate any user at any time without being detected. In this paper we present a pairing-based signcryption scheme using self-certified public keys. In our scheme, users can choose their private keys independently. The public keys of users can be implicitly verified with the subsequent signature verification in a logically single step. A trusted PKG is no longer required. If the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems.
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...
详细信息
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
暂无评论