在机会网络中,由于节点移动、网络稀疏或信号衰减等各种因素通常导致形成的网络大部分时间不连通,传统的无线网络传输模式无法适用于这类环境.本文提出了一种适用于机会网络的基于固定基础设施邮驿站的数据传输方案(mail-relay transfer...在机会网络中,由于节点移动、网络稀疏或信号衰减等各种因素通常导致形成的网络大部分时间不连通,传统的无线网络传输模式无法适用于这类环境.本文提出了一种适用于机会网络的基于固定基础设施邮驿站的数据传输方案(mail-relay transfer scheme,MRTS),MRTS由部署阶段和转发阶段组成,通过对节点历史相遇信息的统计分析,利用贪婪算法找到最佳的邮驿站部署位置,根据节点相遇概率和节点剩余存储空间来决定如何转发消息.仿真结果表明,MRTS可以有效地提高消息传输率.展开更多
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a s...Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.展开更多
文摘在机会网络中,由于节点移动、网络稀疏或信号衰减等各种因素通常导致形成的网络大部分时间不连通,传统的无线网络传输模式无法适用于这类环境.本文提出了一种适用于机会网络的基于固定基础设施邮驿站的数据传输方案(mail-relay transfer scheme,MRTS),MRTS由部署阶段和转发阶段组成,通过对节点历史相遇信息的统计分析,利用贪婪算法找到最佳的邮驿站部署位置,根据节点相遇概率和节点剩余存储空间来决定如何转发消息.仿真结果表明,MRTS可以有效地提高消息传输率.
基金Project supported by the National Science Council (No. NSC 98- 2221-E-415-006-)
文摘Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.