Feature selection is an important means to solve the problem of dimension reduction in anomaly network traffic detection. Focusing on the problem of traditional feature selection algorithm based on information gain ne...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy...
详细信息
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is *** our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret *** guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data *** confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent *** analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI sce...
详细信息
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI scenario. By adding the reasonable assumption, our protocol offers higher min-entropy and, thus, can be used to certify more randomness than the standard SDI protocol of H.-W. Li et al. [Phys. Rev. A 84, 034301 (2011)]. Moreover, randomness expansion can be realized with a lower detection efficiency (about 85.4%) in the trusted source case than the standard one (about 93.4%). Meanwhile, this advantage is robust against parameter deviations of the source. But on the other hand, the sharp measurement cannot improve the performance much in this case. So, there is no need to characterize the measurement accurately. Furthermore, an analytical formula describing the relationship between the dimension witness value and the min-entropy of the output string is derived directly.
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ...
详细信息
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation overhead and translated code of low *** this work,we take advantage of host registers,using register mapping strategy to promote the performance of *** mapping registers from guest Instruction-Set Architectures(ISA) to host machines,it could off-load the overhead caused by load and store operations of *** simplifying the rules of the intermediate code generated,it could lower the number of intermediate code and improve the quality of translated *** X86 to ALPHA on SPEC 2006,the code expansion reduces 32.86%and the performance of the optimized translator is improved by 7.55%.
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp...
详细信息
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
To improve the effect of user influence predicting in microblog, this paper proposed a new method of user influence analysis named UBRWR, based on user interactive behavior and the random walk method. UBRWR firstly us...
详细信息
Herein we introduce a straightforward, low cost, scalable, and technologically relevant method to manufacture an all‐carbon, electroactive, nitrogen‐doped nanoporous‐carbon/carbon‐nanotube composite membrane, dubb...
详细信息
Herein we introduce a straightforward, low cost, scalable, and technologically relevant method to manufacture an all‐carbon, electroactive, nitrogen‐doped nanoporous‐carbon/carbon‐nanotube composite membrane, dubbed “HNCM/CNT”. The membrane is demonstrated to function as a binder‐free, high‐performance gas diffusion electrode for the electrocatalytic reduction of CO 2 to formate. The Faradaic efficiency (FE) for the production of formate is 81 %. Furthermore, the robust structural and electrochemical properties of the membrane endow it with excellent long‐term stability.
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that u...
详细信息
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that universal entanglers may be obtained from random unitary gates according to the Harr measure. The success probability is close to 1 for large system spaces. This result represents the typical density of entanglement subspaces in large state spaces. It also partially solves an open problem of universal bipartite entanglers and is explained by some experiment simulations.
暂无评论