Aiming at the existing IP geolocation approaches does not consider the errors of landmarks, a new geolocation approach utilized landmark calibration is proposed in this paper. At first, by assigning a deviation, the l...
详细信息
ISBN:
(纸本)9781467365918
Aiming at the existing IP geolocation approaches does not consider the errors of landmarks, a new geolocation approach utilized landmark calibration is proposed in this paper. At first, by assigning a deviation, the location of the landmark with low reliability is regarded as a possible area, then geolocating the target IP can be converted into a constrained optimization problem, finding the location estimation of target IP by solving this problem, as well as the real deviation of landmark. The algorithm analysis and experimental results show that, when a landmark is not located in its claimed position, our geolocation approach can still give a location for the target IP.
For the problem that traditional approaches for IP geolocation based on delay measurement are difficult to apply to network with weak connectivity such as China's Internet, in this paper, we utilize its hierarchic...
详细信息
For the problem that traditional approaches for IP geolocation based on delay measurement are difficult to apply to network with weak connectivity such as China's Internet, in this paper, we utilize its hierarchical topology and proposed an approach of City-level geolocation based on routing feature. Taking IPs with known geographical location as reference nodes, this approach extracts identifying IPs of candidate regions or cities based on decision tree learning algorithm. We match the path of the target with IPs above called identifying features, and then select the region or city whose identifying feature is contained on the target's path as geolocation result. This approach improves the average accuracy for the Internet with weak connectivity hierarchical topology to 93% vs. 73% for the previous learning-based geolocation approach.
Inspired by the process of human memory and interaction, this paper provides a discovery model of user demands. We can get the keywords network and episodic network by capture and analysis the user's behavior in t...
详细信息
The fundamental challenge confronting micro-blog short texts is to represent, compute and mine their semantics since they are colloquial language and restricted within 140 words. This paper presents an approach to rep...
详细信息
Feature selection is an important means to solve the problem of dimension reduction in anomaly network traffic detection. Focusing on the problem of traditional feature selection algorithm based on information gain ne...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is *** our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret *** guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data *** confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent *** analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ...
详细信息
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation overhead and translated code of low *** this work,we take advantage of host registers,using register mapping strategy to promote the performance of *** mapping registers from guest Instruction-Set Architectures(ISA) to host machines,it could off-load the overhead caused by load and store operations of *** simplifying the rules of the intermediate code generated,it could lower the number of intermediate code and improve the quality of translated *** X86 to ALPHA on SPEC 2006,the code expansion reduces 32.86%and the performance of the optimized translator is improved by 7.55%.
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI sce...
详细信息
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI scenario. By adding the reasonable assumption, our protocol offers higher min-entropy and, thus, can be used to certify more randomness than the standard SDI protocol of H.-W. Li et al. [Phys. Rev. A 84, 034301 (2011)]. Moreover, randomness expansion can be realized with a lower detection efficiency (about 85.4%) in the trusted source case than the standard one (about 93.4%). Meanwhile, this advantage is robust against parameter deviations of the source. But on the other hand, the sharp measurement cannot improve the performance much in this case. So, there is no need to characterize the measurement accurately. Furthermore, an analytical formula describing the relationship between the dimension witness value and the min-entropy of the output string is derived directly.
暂无评论