The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ...The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given.展开更多
In order to investigate the influence of hybrid coupling on the synchronization of delayed neural networks, by choosing an improved delay-dependent Lyapunov-Krasovskii functional, one less conservative asymptotical cr...In order to investigate the influence of hybrid coupling on the synchronization of delayed neural networks, by choosing an improved delay-dependent Lyapunov-Krasovskii functional, one less conservative asymptotical criterion based on linear matrix inequality (LMI) is established. The Kronecker product and convex combination techniques are employed. Also the bounds of time-varying delays and delay derivatives are fully considered. By adjusting the inner coupling matrix parameters and using the Matlab LMI toolbox, the design and applications of addressed coupled networks can be realized. Finally, the efficiency and applicability of the proposed results are illustrated by a numerical example with simulations.展开更多
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev...The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.展开更多
Globally coupled map (GCM) model can evolve through chaotic searching into several stable periodic orbits under properly controlled parameters. This can be exploited in information processing such as associative memor...Globally coupled map (GCM) model can evolve through chaotic searching into several stable periodic orbits under properly controlled parameters. This can be exploited in information processing such as associative memory and optimization. In this paper, we propose a novel covariance learning rule for multivalue patterns and apply it in memorization of gray scale images based on modified GCM model (S GCM). Analysis of retrieval results are given finally.展开更多
Crayfish shell is an abundant natural waste and is also a potential biosorbent for pollutants,especially,heavy metals.In this study,the safety of the use of crayfish shell as a biosorbent was first assessed by release...Crayfish shell is an abundant natural waste and is also a potential biosorbent for pollutants,especially,heavy metals.In this study,the safety of the use of crayfish shell as a biosorbent was first assessed by release experiments involving primary heavy metal ions,such as Cu^(2+),Zn^(2+),and Cr^(3+),in aqueous solution under different environmental conditions.The release concentrations of heavy metals were dependent on pH,ionic strength,and humic acid;and the maximum release concentrations of heavy metals were still lower than the national standard.Specifically,Cu^(2+) and Pb^(2+) removal by crayfish shell in synthetic wastewater was investigated.The removal process involved biosorption,precipitation,and complexation,and the results indicate that crayfish shell is an excellent biosorbent for Cu^(2+) and Pb^(2+) removal.The precipitation step is particularly dependent on Ca species,pH,and temperature.The maximum removal capacities of Pb^(2+) and Cu^(2+) were 676.20 and 119.98 mg/g,respectively.The related precipitates and the generated complex products include Cu_(2)CO_(3)(OH)_(2),Ca_(2)CuO_(3),CuCO_(3),Pb_(2)CO_(3)(OH)_(2),CaPb_(3)O_(4),and PbCO_(3).展开更多
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg...Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.展开更多
The synchronous conditions of two kinds of the small-world (SW) network are studied. The small world topology can affect on dynamical behaviors of the beam transport network (BTN) largely, if the BTN is constructe...The synchronous conditions of two kinds of the small-world (SW) network are studied. The small world topology can affect on dynamical behaviors of the beam transport network (BTN) largely, if the BTN is constructed with the SW topology, the global linear coupling and special linear feedback can realize the synchronization control of beam halo-chaos as well as periodic state in the BTN with the SW topology, respectively. This important result can provide an effective way for the experimental study and the engineering design of the BTN in the high-current accelerator driven radioactive clean nuclear power systems, and may have potential use in prospective applications for halo-chaos secure communication.展开更多
The paper introduces the Endsley' s situation model into network security to describe the network security situation, and improves Endsley's data processing to suit network alerts. The proposed model contains the in...The paper introduces the Endsley' s situation model into network security to describe the network security situation, and improves Endsley's data processing to suit network alerts. The proposed model contains the information of incident frequency, incident time and incident space. The HoneyNet dataset is selected to evaluate the proposed model in the evaluation. The paper proposes three definitions to depict and predigest the whole situation extraction in detail, and a fusion component to reduce the influence of alert redundancy on the total security situation. The less complex extraction makes the situation analysis more efficient, and the fine-grained model makes the analysis have a better expansibility. Finally, the situational variation curves are simulated, and the evaluation results prove the situation model applicable and efficient.展开更多
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid...In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.展开更多
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i...Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.展开更多
基金Supported by the National High Technology Research and Development Program of China("863"Program)(2006AA706103)~~
文摘The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given.
基金The National Natural Science Foundation of China (No.60764001, 60835001,60875035, 61004032)the Postdoctoral Key Research Fund of Southeast Universitythe Natural Science Foundation of Jiangsu Province(No.BK2008294)
文摘In order to investigate the influence of hybrid coupling on the synchronization of delayed neural networks, by choosing an improved delay-dependent Lyapunov-Krasovskii functional, one less conservative asymptotical criterion based on linear matrix inequality (LMI) is established. The Kronecker product and convex combination techniques are employed. Also the bounds of time-varying delays and delay derivatives are fully considered. By adjusting the inner coupling matrix parameters and using the Matlab LMI toolbox, the design and applications of addressed coupled networks can be realized. Finally, the efficiency and applicability of the proposed results are illustrated by a numerical example with simulations.
基金The National Natural Science Foundation of China(No.71071033)
文摘The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.
文摘Globally coupled map (GCM) model can evolve through chaotic searching into several stable periodic orbits under properly controlled parameters. This can be exploited in information processing such as associative memory and optimization. In this paper, we propose a novel covariance learning rule for multivalue patterns and apply it in memorization of gray scale images based on modified GCM model (S GCM). Analysis of retrieval results are given finally.
基金supported by the Key Special Program on the S&T for the Pollution Control and Treatment of Water Bodies(No.2017ZX07603-003)。
文摘Crayfish shell is an abundant natural waste and is also a potential biosorbent for pollutants,especially,heavy metals.In this study,the safety of the use of crayfish shell as a biosorbent was first assessed by release experiments involving primary heavy metal ions,such as Cu^(2+),Zn^(2+),and Cr^(3+),in aqueous solution under different environmental conditions.The release concentrations of heavy metals were dependent on pH,ionic strength,and humic acid;and the maximum release concentrations of heavy metals were still lower than the national standard.Specifically,Cu^(2+) and Pb^(2+) removal by crayfish shell in synthetic wastewater was investigated.The removal process involved biosorption,precipitation,and complexation,and the results indicate that crayfish shell is an excellent biosorbent for Cu^(2+) and Pb^(2+) removal.The precipitation step is particularly dependent on Ca species,pH,and temperature.The maximum removal capacities of Pb^(2+) and Cu^(2+) were 676.20 and 119.98 mg/g,respectively.The related precipitates and the generated complex products include Cu_(2)CO_(3)(OH)_(2),Ca_(2)CuO_(3),CuCO_(3),Pb_(2)CO_(3)(OH)_(2),CaPb_(3)O_(4),and PbCO_(3).
基金Support by the National High Technology Research and Development Program of China(No.2012AA120802)the National Natural Science Foundation of China(No.61302074)+1 种基金Specialized Research Fund for the Doctoral Program of Higher Education(No.20122301120004)Natural Science Foundation of Heilongjiang Province(No.QC2013C061)
文摘Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time.
基金The project supported by the Key Projects of National Natural Science Foundation of China under Grant No. 70431002 and National Natural Science Foundation of China under Grant Nos. 70371068 and 10247005
文摘The synchronous conditions of two kinds of the small-world (SW) network are studied. The small world topology can affect on dynamical behaviors of the beam transport network (BTN) largely, if the BTN is constructed with the SW topology, the global linear coupling and special linear feedback can realize the synchronization control of beam halo-chaos as well as periodic state in the BTN with the SW topology, respectively. This important result can provide an effective way for the experimental study and the engineering design of the BTN in the high-current accelerator driven radioactive clean nuclear power systems, and may have potential use in prospective applications for halo-chaos secure communication.
基金Supported by the National Natural Science Foundation of China (No. 60605019) and the National High Technology Research and Development Programe of China (No. 2003AA142160).
文摘The paper introduces the Endsley' s situation model into network security to describe the network security situation, and improves Endsley's data processing to suit network alerts. The proposed model contains the information of incident frequency, incident time and incident space. The HoneyNet dataset is selected to evaluate the proposed model in the evaluation. The paper proposes three definitions to depict and predigest the whole situation extraction in detail, and a fusion component to reduce the influence of alert redundancy on the total security situation. The less complex extraction makes the situation analysis more efficient, and the fine-grained model makes the analysis have a better expansibility. Finally, the situational variation curves are simulated, and the evaluation results prove the situation model applicable and efficient.
基金This work was supported by the National Natural Science Foundation of China under Grant No. 60873199.
文摘In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.
基金supported by National Key Basic Research Program of China (No.2014CB340600)partially supported by National Natural Science Foundation of China (Grant Nos.61332019,61672531)partially supported by National Social Science Foundation of China (Grant No.14GJ003-152)
文摘Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.