As an important security service in distributed systems, non-repudiation is required to implement evidence generating or validating in the application layer. Formal methods are powerful tools to provide security servi...
详细信息
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in C...
详细信息
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in China have developed an architecture centric technical framework for the definition, incarnation and engineering of Internetware. First of all, a software model for Internetware is defined for what to be, including that Internetware entities should be packaged as components, behaving as agents, interoperating as services, collaborating in a structured and on demand manner, etc. Secondly, a middleware for Internetware is designed and implemented for how to be, including that Internetware entities are incarnated by runtime containers, structured collaborations are enabled by runtime software architecture, Internetware can be managed in a reflective and autonomic manner, etc. Thirdly, an engineering methodology for Internetware is proposed for how to do, including the way to develop Internetware entities and their collaborations by transforming and refining a set of software architectures which cover all the phases of software lifecycle, the way to identify and organize the disordered software assets by domain modeling, etc.
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB...
详细信息
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPBS) and gave the security proof. In this paper, we present a cryptanalysis of the scheme and show that the signature scheme does not satisfy the property of unforgeability as claimed. More precisely, a user can forge a valid message-signature pair (ID, msg, info', σ') instead of the original one (ID, msg, info, σ), where info is the original common agreed information and info'≠info. Therefore, it will be much dangerous if Wang-Tang-Li's ID-RPBS scheme is applied to the off-line electronic cash system. For example, a bank is supposed to issue an electronic coin (or bill) of $100 to a user, while the user can change the denomination of the coin (bill) to any value, say $100 000 000, at his will.
Variance shadow maps algorithm reduces aliasing by pre-filtering the depth texture from which an occlusion probability up-bound is computed. But for scenes with high depth complexity this method is unable to correctly...
详细信息
software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c...
详细信息
software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such circumstance, trust evaluation model becomes focus of intense research at current time. Trust evaluation model establishes a management framework of trust relationship between entities, involving expression and measurement of trust, comprehensive calculation of direct trust value and recommended trust value, and recognition of malicious entities and recommendations. Based on the analysis of several typical trust evaluation models, the classification of trust evaluation ideas and modes is discussed, the questions existing in current research and the directions of future research are pointed out.
The researches focus in DDoS attack detection on target-end network. A new method to detect DDoS attacks based on TCP is given. For DDoS attacks based on TCP, many unacknowledged segments of both communication sides w...
详细信息
ISBN:
(纸本)160132085X
The researches focus in DDoS attack detection on target-end network. A new method to detect DDoS attacks based on TCP is given. For DDoS attacks based on TCP, many unacknowledged segments of both communication sides will be observed. In every time period Δt, calculates the ratio of unacknowledged segments' number and all segments' number. Then, the statistical sequence based on time will come into being. Furtherly, use an improved nonparameter recursive CUSUM algorithm to efficiently detect DDoS attacks online. In the procedure of attack detection, the suspicious attack packets can also be recorded. Experiments prove that our algorithm is fast and efficient. It has low false-positive rate and can adapt to more complex network environments. In addition, it is helpful to attack analysis and traceing.
We proposed a fully-software distributed failure diagnosis system for vehicles based on the TH-OSEK realtime embedded OS platform we previously developed. The diagnosis system puts all the ECUs into a virtual logical ...
详细信息
Autonomous landing is an important part of the autonomous control of Unmanned Aerial Vehicles (UAVs). In this article we present the design and implementation of a vision algorithm for autonomous landing. We use an on...
详细信息
Location Dependent information Services (LDISs) are gaining increasing popularity in recent years. Due to limited client power and untermittent connectivity, caching is an Important approach to improve the performance...
详细信息
暂无评论