Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Shou-shan LUO"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 19-27 (2017)
For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GD
Externí odkaz:
https://doaj.org/article/4650918f16ed4f428f620b8262e04b97
Publikováno v:
Tongxin xuebao, Vol 37, Pp 87-95 (2016)
A privacy-preserving point-in-polygon protocol was proposed under semi-honest model, to deal with the prob-lem of high complexity and limitation of the existing protocols. First, an blivious point-line protocol was designed by extending the tradition
Externí odkaz:
https://doaj.org/article/cade8a2d86fd4ddbb0755aae9e318dbd
Publikováno v:
Tongxin xuebao, Vol 34, Pp 166-176 (2013)
According to the problems of intrusion detection,an integrated intrusion detection model based on rough set and artificial immune (RSAI-IID) was proposed by using rough set and integrating misuse detection and anomaly detection.The rough set method w
Externí odkaz:
https://doaj.org/article/0a94366a722b468abf88833ef9ed0ab4
Publikováno v:
Tongxin xuebao, Vol 34, Pp 191-200 (2013)
By studying the related issues of the router node trust,a dynamic adjacent credibility-trust model which inte-grates factors of state and behavior of the router node was proposed.On the basis of dynamic adjacent credibility-trust model,a security rou
Externí odkaz:
https://doaj.org/article/e3cfdf6e519c401cac00efa4d80b87ca
Publikováno v:
Tongxin xuebao, Vol 34, Pp 30-42 (2013)
The model and framework of secure multi-party computational geometry were presented based on the existing protocols.The new framework has three dimensions,the math model,the security model and the communication model.Using the new model and framework
Externí odkaz:
https://doaj.org/article/cd7fb27a47694403926794e25785e60c
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 5, Iss 5 (2012)
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network
Externí odkaz:
https://doaj.org/article/152f3a1fa3e940f2bf59542da8e74391
Publikováno v:
Neurocomputing. 214:391-400
To exploit the strengths of misuse detection and anomaly detection, an intensive focus on intrusion detection combines the two. From a novel perspective, in this paper, we proposed a hybrid approach toward achieving a high detection rate with a low f
Publikováno v:
Computers & Security. 39:255-267
Because of their feasibility and effectiveness, artificial intelligence-based intrusion detection systems attract considerable interest from researchers. However, when confronted with large-scale data sets, many artificial intelligence-based intrusio
Publikováno v:
Quantum Information Processing. 11:1715-1739
Quantum entanglement plays an essential role in the field of quantum information and quantum computation. In quantum network, a general assumption for many quantum tasks is that the quantum entanglement has been prior shared among participants. Actua
Publikováno v:
Applied Mechanics and Materials. :265-270
Considering constant-round protocols for generating random shared values, for secure multiplication and for addition of shared values, etc are available and can be met by known techniques in all standard models of communication. Protocols are present