简介:ThisstudyconcernssecurityissuesoftheemergingWirelessBodySensorNetwork(WBSN)formedbybiomedicalsensorswornonorimplantedinthehumanbodyformobilehealthcareappli-cations.Anovelauthenticatedsymmetric-keyestablishmentschemeisproposedforWBSN,whichfullyexploitsthephysiologicalfeaturesobtainedbynetworkentitiesviathebodychannelavailableinWBSNbutnototherwirelessnetworks.Theself-definedIntrinsicSharedSecret(ISS)isusedtoreplacethepre-deploymentofsecretsamongnetworkentities,whichthuseliminatescentralizedservicesorau-thoritiesessentialinexistingprotocols,andresolvesthekeytransportprobleminthepuresymmet-ric-keycryptosystemforWBSNaswell.Thesecuritypropertiesoftheproposedschemearedemon-stratedintermsofitsattackcomplexityandthetypesofattacksitcanresist.Besides,theschemecanbeimplementedunderalight-weightwayinWBSNsystems.DuetotheimportanceoftheISSconcept,theanalysisonusingfalseacceptance/falserejectionmethodtoevaluatetheperformanceofISSforitsusageintheschemeisalsodemonstrated.
简介:Recently,ithasbeenseenthattheensembleclassifierisaneffectivewaytoenhancethepredictionperformance.However,itusuallysuffersfromtheproblemofhowtoconstructanappropriateclassifierbasedonasetofcomplexdata,forexample,thedatawithmanydimensionsorhierarchicalattributes.Thisstudyproposesamethodtoconstructeanensembleclassifierbasedonthekeyattributes.Inadditiontoitshigh-performanceonprecisionsharedbycommonensembleclassifiers,thecalculationresultsarehighlyintelligibleandthuseasyforunderstanding.Furthermore,theexperimentalresultsbasedontherealdatacollectedfromChinaMobileshowthatthekey-attributes-basedensembleclassifierhasthegoodperformanceonbothoftheclassifierconstructionandthecustomerchurnprediction.
简介:Histogramofcollineargradient-enhancedcoding(HCGEC),arobustkeypointdescriptorformulti-spectralimagematching,isproposed.TheHCGECmainlyencodesroughstructureswithinanimageandsuppressesdetailedtexturalinformation,whichisdesirableinmulti-spectralimagematching.Experimentsontwomulti-spectraldatasetsdemonstratethattheproposeddescriptorcanyieldsignificantlybetterresultsthansomestate-ofthe-artdescriptors.
简介:在信任计算的一个重要函数是保护的存储,它能保护数据和钥匙的无限的数量。在存在为信任站台的信任站台模块(TPM)钥匙装载计划,有是的TPM的一个计算平台它的信任的锚,装载操作的全部的时间与装载目标目标的祖先的数字一样,导致装载有许多祖先的一把TPM钥匙的低效率。改进效率,装载计划的一把基于身份的TPM钥匙被建议。在这个计划,装载操作的时间当任何TPM钥匙被装进TPM时,仅仅是二。因此,要求的时间花费了因为装载一个TPM关键罐头被减少,特别为复杂TPM关键存储层次。由分析正确性,安全,效率和可行性,建议计划有更好理论并且应用程序价值。
简介:Timeefficiencyofkeyestablishmentandupdateisoneofthemajorproblemscontributorykeymanagementsstrivetoaddress.Toachievebettertimeefficiencyinkeyestablishment,weproposeaLocation-basedHuffman(L-Huffman)scheme.First,usersareseparatedintoseveralsmallgroupstominimizecommunicationcostwhentheyaredistributedoverlargenetworks.Second,bothuser'scomputationdifferenceandmessagetransmissiondelayaretakenintoconsiderationwhenHuffmancodingisemployedtoformingtheoptimalkeytree.Third,thecombinedweightsinHuffmantreearelocatedinahigherplaceofthekeytreetoreducethevarianceoftheaveragekeygenerationtimeandminimizethelongestkeygenerationtime.SimulationsdemonstratethatL-HuffmanhasmuchbetterperformanceinwideareanetworksandisalittlebetterinlocalareanetworkthanHuffmanscheme.
简介:Thisarticleisfocusedonanalyzingthekeytechnologiesofnewmaliciouscodeandcorrespondingdefensivemeasuresinthelarge-scalecommunicationnetworks.Basedondescriptionoftheconceptsanddevelopmentofthemaliciouscode,thearticleintroducestheanti-analysistechnology,splittingandinsertingtechnology,hidingtechnology,polymorphvirustechnology,andautoproductiontechnologyofthemaliciouscodetrendswithintelligence,diversityandintegration.Followingthat,itsummarizesthesecurityvulnerabilitiesofcommunicationnetworksfromfourrelatedlayersaspects,accordingtothemechanismsofmaliciouscodeinthecommunicationnetworks.Finally,itproposesrapidresponsedispositionofmaliciouscodeattacksfromfourcorrelatedsteps:buildingupthenetworknodemonitoringsystem,suspiciouscodefeatureautomationanalysisandextraction,rapidactivemaliciouscoderesponsetechniqueforunknownmaliciouscode,andmaliciouscodeattackimmunitytechnique.Asaresult,itactivelydefensesagainsttheunknownmaliciouscodeattacksandenhancesthesecurityperformanceofcommunicationnetworks.
简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.
简介:Nowadays,thepassword-basedremoteuserauthenticationmechanismusingsmartcardisoneofthesimplestandconvenientauthenticationwaystoensuresecurecommunicationsoverthepublicnetworkenvironments.Recently,Liuetal.proposedanefficientandsecuresmartcardbasedpasswordauthenticationscheme.However,wefindthatLiuetal.’sschemeisvulnerabletotheoff-linepasswordguessingattackanduserimpersonationattack.Furthermore,italsocannotprovideuseranonymity.Inthispaper,wecryptanalyzeLiuetal.’sschemeandproposeasecurityenhanceduserauthenticationschemetoovercometheaforementionedproblems.Especially,inordertopreservetheuseranonymityandpreventtheguessingattack,weusethedynamicidentitytechnique.Theanalysisshowsthattheproposedschemeismoresecureandefficientthanotherrelatedauthenticationschemes.
简介:Withouttheassumptionthattheprivatekeysarekeptsecureperfectly,cryptographicprimitivescannotbedeployedintheinsecureenvironmentswherethekeyleakageisinevitable.Inordertoreducethedamagecausedbythekeyexposureintheidentity-based(ID-based)signaturescenariosefficiently,weproposeanID-basedkey-insulatedsignatureschemeinthispaper,whicheliminatestheexpensivebilinearpairingoperations.Comparedwiththepreviouswork,ourschememinimizesthecomputationcostwithoutanyextracost.Underthediscretelogarithm(DL)assumption,asecurityproofofourschemeintherandomoraclemodelhasalsobeengiven.
简介:Intheair-waterquantumkeydistribution(QKD),theirregularseasurfacehassomeinfluenceonthephotonpolariza-tionstate.Thewindisconsideredasthemainfactorcausingtheirregularity,sothemodelofirregularseasurfacebasedonthewindspeedisadopted.Therelationshipsofthequantumbiterrorratewiththewindspeedandtheinitialincidentanglearesimulated.Therefore,themaximumsecuretransmissiondepthofQKDisconfirmed,andthelimita-tionofthewindspeedandtheinitialincidentangleisdetermined.Thesimulationresultsshowthatwhenthewindspeedandtheinitialincidentangleincrease,theperformanceofQKDwillfalldown.Undertheintercept-resendattackcondition,themaximumsafetransmissiondepthofQKDisupto105m.Torealizesafecommunicationsinthesafedivingdepthofsubmarines(100m),theinitialincidentangleisrequestedtobenotexceeding26~,andwiththeinitialincidentan~leincreased,thelimitationofwindspeedisdecreased.
简介:Withparametricdown-conversionsources(PDCSs),thenonorthogonaldecoystateprotocolbasedononevacuumandtwoweakdecoystatesispresented.ThedetectioneventsonBob'ssidearedividedintotwogroupsdependingonwhetherAlicegetsatriggerornot:triggeredcomponentsandnontriggeredcomponents.Thetriggeredcomponentsareusedtoestimatethefractionsanderrorratesofsingle-photonandtwo-photonpulses,andthenthefinalsecurekeyrateisdeduced.Besides,bothtriggeredandnontriggeredcomponentsareusedtodeduceamoreaccuratevalueofthekeygenerationrate.Thesimulationofthefinalkeygenerationrateovertransmissiondistanceshowsthatthefirstmethodcanobtainakeygenerationrateclosetothetheoreticallimitoftheinfinitedecoystateprotocol,whilethesecondmethodisbetter.
简介:UnlikeIndo-Europeanlanguages,Mandarinreliesheavilyonlexicaltonestodistinguishwordidentity.Usingtheintermodalpreferentiallookingparadigm,thisstudyexamined3-year-oldMandarinspeakers'abilitytouseMandarinlexicaltonesinlearningnewwords.ResultsshowedthatwhenchildrenwerepresentedwithTone2(rising)andTone4(falling)pairs,childrensuccessfullylearnedbothwords.However,whenchildrenwerepresentedwithTone2andTone3(dipping)pairs,theylearnedtheTone2wordbutnottheTone3one.ChildrenwerethendividedintotwogroupsbasedontheirlearningperformanceontheTone3word.SuccessfullearningofTone3wordswasobservedinthehighperformersbutnotinthelowperformers,whoconsistentlymisusedTone3asTone2.ThisstudyshowedthatMandarinspeaking3-year-oldscoulduselexicaltonestolearnwordsunderexperimentalconditions,andthatthedifficultyofTone3acquisitionmayberelatedtoitslowerlevelofperceptualdistinctivenesscomparedwithothertones.
简介:为了在无线传感器网络(WSN)完成安全通讯,在有有限计算能力的传感器节点随机在敌对领土上被散布的地方,各种各样的关键分发前策划(KPS)被建议了。在这份报纸,新KPS在有限的地上基于symplectic几何学被建议。在一个symplectic空格的固定维的subspace代表一个节点,所有1-dimensionalsubspaces表示钥匙和每个节点分享了钥匙。但是这天真的印射不保证一个好网络得到跳回。因此,它被建议二个节点不得不计算一把pairwise钥匙的提高的KPS,仅当他们分享至少q普通钥匙。这条途径对节点俘获攻击提高跳回。与解决方案的存在相比,结果证明那条新途径更加提高网络可伸缩性,并且完成好连接和好全面性能。
简介:一个光标签的标签扑灭比率和分散赔偿正在交换传播系统优化,它采用40-Gb/s回来到调音的零微分阶段移动(RZ-DPSK)用622-Mb/s振幅移动调音标记的收费载重(问)控制数据。在我们的计划,收费载重和标签的接收装置敏感分别地完成-27.8dBm和-33.5dBm。在在40km上播送了以后,60km和80km挑选模式纤维(SMF)(与分散赔偿)分别地,收费载重能没有力量惩罚被恢复,当标签能与不到2dB惩罚被恢复时。