According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group ...
详细信息
ISBN:
(纸本)9789811136719
According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group elements, the verification stage requires only 3 pairing operations, and the algorithm is proved secure based on the computational Diffie-Hellman problem under the random oracle model. Compared with the other similar algorithm, this algorithm achieves higher security with higher efficiency and lower cost of communication. Then according to the signature algorithm proposed in this paper, an authentication scheme with the function of mutual authentication, aggregate authentication and group key agreement is presented. The analysis results show that the scheme is secure and efficient, especially suitable for the large-scale space networks.
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin...
详细信息
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli...
详细信息
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o...
详细信息
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is...
详细信息
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam...
详细信息
Code injection attack is a major security threat to applications, especially web applications. This type of attack stems from the attacker's ability to use the vulnerability/backdoor of the application to inject a...
详细信息
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in...
详细信息
暂无评论