期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Open Access Strategy in Cloud Computing-Based Heterogenous Networks Constrained by Wireless Fronthaul
1
作者 Zhongyuan Zhao Yong Li +2 位作者 Weiliang Xie Min Wang Wenbo Wang 《China Communications》 SCIE CSCD 2017年第2期143-153,共11页
Cloud computing.based heterogeneous networks(C.Het Nets) have been considered as promising network architecture of future wireless communication systems. However, its performance is constrained by the capability of fr... Cloud computing.based heterogeneous networks(C.Het Nets) have been considered as promising network architecture of future wireless communication systems. However, its performance is constrained by the capability of fronthaul. To study the performance limit of C.Het Nets, the coverage performance of the open access strategy in C.Het Nets is analyzed in this paper. In particular, the non.ideal condition of fronthaul in C.Het Nets is characterized by establishing a stochastic geometry.based model, and a tight lower bound on coverage probability is derived for downlink transmissions. Based on the derived results, the constraint of the fronthaul is given to ensure that open access strategy can achieve the best coverage performance. Finally, the simulation results are provided to verify the theoretical results and show the impact of fronthaul constrains. 展开更多
关键词 C-Het Nets open access strategy coverage probability stochastic geometry
下载PDF
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors 被引量:1
2
作者 Ruizhong Du Ailun Tan Junfeng Tian 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期579-588,共10页
Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In t... Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In this paper,we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server.To solve the problem of keyword privacy,we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers.System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem.We validate our scheme through theoretical security analysis and experimental verification.Experiments are conducted on a real dataset,and results show that the scheme has higher security and retrieval efficiency than previous methods. 展开更多
关键词 Attribute-Based Encryption(ABE) unrecognizable trapdoor two-way access strategy ciphertext search
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部