您的位置: 专家智库 > >

国家自然科学基金(61161140320)

作品数:15 被引量:33H指数:3
相关作者:曹珍富郭非原泉周亚建杨义先更多>>
相关机构:上海交通大学北京邮电大学鲁东大学更多>>
发文基金:国家自然科学基金霍英东教育基金国家重点基础研究发展计划更多>>
相关领域:自动化与计算机技术理学电子电信交通运输工程更多>>

文献类型

  • 15篇期刊文章
  • 3篇会议论文

领域

  • 9篇自动化与计算...
  • 5篇电子电信
  • 4篇理学
  • 1篇机械工程
  • 1篇交通运输工程

主题

  • 2篇信任模型
  • 2篇疫苗
  • 2篇用户
  • 2篇入侵
  • 2篇入侵检测
  • 2篇身份认证
  • 2篇数据网
  • 2篇通信
  • 2篇签名
  • 2篇人工免疫
  • 2篇网络
  • 2篇CLOUD_...
  • 1篇电网
  • 1篇端到端
  • 1篇信任
  • 1篇移动用户
  • 1篇疫苗接种
  • 1篇隐私
  • 1篇隐私保护
  • 1篇有限域

机构

  • 6篇上海交通大学
  • 4篇北京邮电大学
  • 1篇华东师范大学
  • 1篇鲁东大学
  • 1篇山东大学
  • 1篇郑州轻工业学...

作者

  • 6篇曹珍富
  • 1篇董晓蕾
  • 1篇杨榆
  • 1篇郭非
  • 1篇李国友
  • 1篇张玲
  • 1篇李哲
  • 1篇郑培凝
  • 1篇谢康
  • 1篇林正松
  • 1篇郑世慧
  • 1篇黄家斌
  • 1篇杨义先
  • 1篇汪京培
  • 1篇孙斌
  • 1篇刘世俊
  • 1篇周亚建
  • 1篇王励成
  • 1篇原泉
  • 1篇闫建华

传媒

  • 3篇通信技术
  • 3篇Tsingh...
  • 2篇黑龙江大学自...
  • 2篇The Jo...
  • 2篇Scienc...
  • 1篇通信学报
  • 1篇应用科学学报
  • 1篇密码学报

年份

  • 1篇2015
  • 3篇2014
  • 12篇2013
  • 2篇2012
15 条 记 录,以下是 1-10
排序方式:
一种基于身份的智能电网认证模式被引量:4
2012年
提出了一个移动用户智能电网(Mobile User Smart Grid,MUSG)概念,给出了MUSG场景下的用电模式描述,并利用基于身份的密码技术给出了一种基于身份的MUSG认证方案。分析表明,利用该认证方案不仅可以有效解决智能电网中移动用户的认证问题,满足移动用户即时用电和户外用电的需求,并且在保障系统安全性的同时有效降低了系统的计算和通信开销,减轻了系统的负载压力,提高了系统的使用效率。这为智能电网业务由固定用户向移动用户过渡奠定了基础。
郭非曹珍富
关键词:智能电网移动用户身份认证
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security被引量:3
2013年
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics.
Zhen ChenLinyun RuanJunwei CaoYifan YuXin Jiang
关键词:分布式文件系统法医
利用干扰消除的协同中继传输方案被引量:3
2013年
为了提高无线协同中继传输系统的可达速率和吞吐量,提出了利用干扰消除的协同传输方案.通过监听获得干扰信号的先验信息,再利用干扰重构减去技术来消除干扰信号,减少了系统传输时隙.同时,推导出系统可达速率和中断概率的表达式,分析了不同传输方案下不同中继转发模式的系统性能.仿真结果表明:随着链路信噪比的增大,基于干扰消除的协同传输方案能够有效地提高系统可达速率;当链路信噪比未知时,通过调节发送速率,可以获得系统的最优吞吐量.
李国友周亚建原泉杨义先
关键词:协同通信可达速率
基于可信建模过程的信任模型评估算法
目前缺少有效的评估方法对己存的信任模型进行分析和评估。为解决该问题,提出了一种新的基于可信建模过程的信任模型评估算法。将信任模型按照信任生命周期分解成信任产生、信任建模、信任计算、信任决策和信任传递五部分,对每个过程进行...
汪京培孙斌钮心忻杨义先
关键词:信任信任模型
文献传递
Trust routing algorithm based on multiple decision factor theory in OSPF protocol
2013年
This paper presents a novel trust model based on multiple decision factor theory(MDFT)and a trust routing algorithm based on MDFT to exactly evaluate routing node trust and establish a trustworthy routing path.MDFT integrates four dimensional trust decision factors including behavior,state,recommend and node liveness to realize an exactly finer-grained trust evaluation.On the basis of MDFT,a trust routing algorithm is presented and validated in open shortest path first(OSPF)protocol.Simulation results show that the algorithm can reflect the routing node trust accurately and has better dynamic response ability.Under the circumstance of existing deceptive nodes,the algorithm has better anti-deception performance and higher attack node detection rate than conventional algorithm.
HAN TingLUO Shou-shanZHU Hong-liangXIN Yang
关键词:OSPF协议路由算法信任模型开放最短路径优先欺骗性
Performance Evaluation and Dynamic Optimization of Speed Scaling on Web Servers in Cloud Computing被引量:3
2013年
The energy consumption in large-scale data centers is attracting more and more attention today with the increasing data center energy costs making the enhanced performance very expensive. This is becoming a bottleneck to further developments in terms of both scale and performance of cloud computing. Thus, the reduction of the energy consumption by data centers is becoming a key research topic in green IT and green computing. The web servers providing cloud service computing run at various speeds for different scenarios. By shifting among these states using speed scaling, the energy consumption is proportional to the workload, which is termed energy-proportionality. This study uses stochastic service decision nets to investigate energy-efficient speed scaling on web servers. This model combines stochastic Petri nets with Markov decision process models. This enables the model to dynamically optimize the speed scaling strategy and make performance evaluations. The model is graphical and intuitive enough to characterize complicated system behavior and decisions. The model is service-oriented using the typical service patterns to reduce the complex model to a simple model with a smaller state space. Performance and reward equivalent analyse substantially reduces the system behavior sub-net. The model gives the optimal strategy and evaluates performance and energy metrics more concisely.
Yuan TianChuang LinZhen ChenJianxiong WanXuehai Peng
关键词:WEB服务器随机PETRI网状态空间模型
TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing被引量:8
2013年
Collaborative filtering solves information overload problem by presenting personalized content to individual users based on their interests, which has been extensively applied in real-world recommender systems. As a class of simple but efficient collaborative filtering method, similarity based approaches make predictions by finding users with similar taste or items that have been similarly chosen. However, as the number of users or items grows rapidly, the traditional approach is suffering from the data sparsity problem. Inaccurate similarities derived from the sparse user-item associations would generate the inaccurate neighborhood for each user or item. Consequently, its poor recommendation drives us to propose a Threshold based Similarity Transitivity (TST) method in this paper. TST firstly filters out those inaccurate similarities by setting an intersection threshold and then replaces them with the transitivity similarity. Besides, the TST method is designed to be scalable with MapReduce framework based on cloud computing platform. We evaluate our algorithm on the public data set MovieLens and a real-world data set from AppChina (an Android application market) with several well-known metrics including precision, recall, coverage, and popularity. The experimental results demonstrate that TST copes well with the tradeoff between quality and quantity of similarity by setting an appropriate threshold. Moreover, we can experimentally find the optimal threshold which will be smaller as the data set becomes sparser. The experimental results also show that TST significantly outperforms the traditional approach even when the data becomes sparser.
Feng XieZhen ChenHongfeng XuXiwei FengQi Hou
关键词:最优阈值TST个人用户
一种无状态的短签名方案
2012年
提出一种无状态的短签名方案,公开参数只有4项,私钥1项,签名2项,它同时也是很高效的,并且具有一定扩展性。之前的短签名方案要么基于复杂的假设,要么签名者需持有状态,或者效率比较低。首先证明方案是在标准模型下基于CDH假设是弱选择消息攻击不可伪造的,然后利用变色龙哈希函数的性质,可以使方案的安全性提升到标准模型同样假设下适应性选择消息攻击不可伪造的。相对于其他签名方案,本方案有其独特的优势。
郑培凝曹珍富
关键词:签名
有限域上方程x^r=a的求解
2014年
有限域上方程求解在一些著名的公钥密码算法、二次筛法分解整数算法、椭圆曲线上点的计数及椭圆曲线素性检测中都有重要应用.在这篇文章中我们对Berlekamp在Fp上求解x2=a的随机算法进行了扩展,以用来对x3=a这样的代数方程来求解,同时利用分圆理论给出了其期望运行时间的分析.与以往的算法不同的是,我们使用二次剩余理论来对三次方程进行求解,计算的过程中并不需要寻找三次非剩余,该算法的期望运行时间为O(log2p(loglogp))次位操作.同时我们也将这一方法扩展到对Fp上任意的三次方程即x3+ax2+bx+c=0的求解,给出对于该方程解的个数并求得x3+ax2+bx+c=0的所有解.另外,我们将Cipolla-Lehmer方法通过计算有限域上元素范数的方法扩展到Fp上方程xr=a的求解,其中r为素数幂,该算法也是随机算法.我们通过构造Fq[x]上的不可约多项式f(x),来构造我们的算法,其中deg(f)=r且f(x)的常数项为(-1)ra.同时我们利用Davenport-Hasse关系和Double Counting技术,给出对我们的算法分析,其期望运行时间为O(logq)次Fq上的运算.对于满足r4=q的r,我们的算法是非常有效的.
李哲董晓蕾曹珍富
关键词:有限域
An Efficient patch dissemination strategy for mobile phone networks
Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they...
Dawei ZhaoHaipeng PengLixiang LiYixian YangShudong Li
文献传递
共2页<12>
聚类工具0