Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
This paper deals with the problem of uniqueness of meromorphic functions with two deficient values and obtains a result which is an improvement of that of F.Gross and Yi Hongxun.
This paper presented a new shared cache technique-the grouping cache, which could solve many invalid queries in the broadcast probe and the control bottleneck of the centralized web cache by dividing all cooperative c...This paper presented a new shared cache technique-the grouping cache, which could solve many invalid queries in the broadcast probe and the control bottleneck of the centralized web cache by dividing all cooperative caches into several groups according to their positions in the network topology. The technique has the following characteristics: The overhead of multi-cache query can be reduced efficiently by the cache grouping scheme; the compact summary of the cache directory can rapidly determine if a request exists in a cache within the group; the distribution algorithm based on the web-access logs can effectively balance the load among all the groups. The simulation test demonstrated that the grouping cache was more effective than any other existing shared cache techniques.展开更多
A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate pa...A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined.展开更多
We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-pho...We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.展开更多
The main features and connotation of the tolerance human resource management based on strategy are analyzed and summarized. The theory and method of systematic engineering is used to build the evaluation index systems...The main features and connotation of the tolerance human resource management based on strategy are analyzed and summarized. The theory and method of systematic engineering is used to build the evaluation index systems for the tolerance human resource management. On the basis of it, by using the theory of matter-element analysis, the matter-element models are formulated for the evaluation of the tolerance human resource management. Regarding annual tolerance human resource management as the object of matter-dement, the tolerance human resource :management for two years are analyzed and evaluated through using the matter. element models proposed. A ease study is carried out and the satisfactory results are obtained. A new scientific methed is provided for the evaluation of human resource management based on strategy.展开更多
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib...A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme.展开更多
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘This paper deals with the problem of uniqueness of meromorphic functions with two deficient values and obtains a result which is an improvement of that of F.Gross and Yi Hongxun.
文摘This paper presented a new shared cache technique-the grouping cache, which could solve many invalid queries in the broadcast probe and the control bottleneck of the centralized web cache by dividing all cooperative caches into several groups according to their positions in the network topology. The technique has the following characteristics: The overhead of multi-cache query can be reduced efficiently by the cache grouping scheme; the compact summary of the cache directory can rapidly determine if a request exists in a cache within the group; the distribution algorithm based on the web-access logs can effectively balance the load among all the groups. The simulation test demonstrated that the grouping cache was more effective than any other existing shared cache techniques.
基金The project partly supported by the Program of New Century Excellent Talents at the Universities of China under Grant No.NCET06-0554National Natural Science Foundation of China under Grant No.60677001+3 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the General Fund of the Educational Committee of Anhui Province under Grant No.2006KJ260Bthe Postgraduate Innovation Research Plan from Anhui University under Grant No.20073039
文摘A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined.
基金The project supported by National Natural Science Foundation of China under Grant No. 10304022, the Science-Technology Fund of Anhui Province for 0utstanding Youth under Grant No. 06042087, the General Fund of the Educational Committee of Anhui Province under Grant No. 2006KJ260B, and the Key Fund of the Ministry of Education of China under Grant No. 206063. We are very grateful to Prof. ZHANG Zhan-Jun for his detailed instructions and help.
文摘We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.
文摘The main features and connotation of the tolerance human resource management based on strategy are analyzed and summarized. The theory and method of systematic engineering is used to build the evaluation index systems for the tolerance human resource management. On the basis of it, by using the theory of matter-element analysis, the matter-element models are formulated for the evaluation of the tolerance human resource management. Regarding annual tolerance human resource management as the object of matter-dement, the tolerance human resource :management for two years are analyzed and evaluated through using the matter. element models proposed. A ease study is carried out and the satisfactory results are obtained. A new scientific methed is provided for the evaluation of human resource management based on strategy.
基金Supported by the National Natural Science Foundation of China under Grant No.60902044Ph.D.Programs Foundation of Ministry of Education of China under Grant No.20090162120070+2 种基金Postdoctoral Science Foundation of China under Grant No.200801341State Key Laboratory of Advanced Optical Communication Systems and Networks under Grant No.2008SH01in part by the Second stage of Brain Korea 21 programs,Chonbuk National University,Korea
文摘A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme.