您的位置: 专家智库 > >

上海市自然科学基金(05ZR14083)

作品数:4 被引量:2H指数:1
相关作者:孙迅杨树堂王跃辉陈恭亮李建华更多>>
相关机构:佳木斯大学上海交通大学更多>>
发文基金:上海市自然科学基金国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 4篇自动化与计算...

主题

  • 2篇SECURE
  • 2篇TRUSTE...
  • 1篇签名
  • 1篇签名方案
  • 1篇可证明安全
  • 1篇基于身份
  • 1篇NETWOR...
  • 1篇P2
  • 1篇PEER-T...
  • 1篇SCHWAR...
  • 1篇TC
  • 1篇TRUST_...
  • 1篇BASED_...
  • 1篇DAA
  • 1篇DWT
  • 1篇ON-LIN...
  • 1篇SELF-S...
  • 1篇ANONYM...
  • 1篇MULTI-...
  • 1篇NON-ST...

机构

  • 1篇上海交通大学
  • 1篇佳木斯大学

作者

  • 1篇李建华
  • 1篇陈恭亮
  • 1篇王跃辉
  • 1篇杨树堂
  • 1篇孙迅

传媒

  • 2篇Journa...
  • 1篇上海交通大学...
  • 1篇Wuhan ...

年份

  • 1篇2010
  • 3篇2008
4 条 记 录,以下是 1-4
排序方式:
Efficient and Secure Multi-Signature Scheme Based on Trusted Computing被引量:1
2008年
A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer's privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new signers are allowed to join the signature without modifying the public key, and attacks caused by secret key dumping or leaking can be avoided.
HAO LimingYANG ShutangLU SongnianCHEN Gongliang
关键词:MULTI-SIGNATURE
标准模型下有短公开参数的基于身份签名方案
2008年
针对Chatterjee-Sarkar分等级的基于身份加密(HIBE)方案,提出了一个新的基于身份的签名(IBS)方案,并在标准模型下证明了该方案的安全性.分析表明,该方案的系统公开参数短于标准模型下基于身份的其他签名方案.
孙迅李建华陈恭亮王跃辉杨树堂
关键词:可证明安全
On-line Modeling of Non-stationary Network Traffic with Schwarz Information Criterion
2010年
Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large time-scale. This paper investigates the change of non-stationary self-similarity of network traffic over time,and proposes a method of combining the discrete wavelet transform (DWT) and Schwarz information criterion (SIC) to detect change points of self-similarity in network traffic. The traffic is segmented into pieces around changing points with homogenous characteristics for the Hurst parameter,named local Hurst parameter,and then each piece of network traffic is modeled using fractional Gaussian noise (FGN) model with the local Hurst parameter. The presented experimental performance on data set from the Internet Traffic Archive (ITA) demonstrates that the method is more accurate in describing the non-stationary self-similarity of network traffic.
夏正敏陆松年李建华铁玲
关键词:SELF-SIMILARITY
A Secure Trust Model for P2P Systems Based on Trusted Computing被引量:1
2008年
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.
郝黎明杨树堂陆松年陈恭亮
关键词:PEER-TO-PEER
共1页<1>
聚类工具0