By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue eith...By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files.展开更多
Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are mat...Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are matched through a search of the entire application data.On the basis of LW_DPI schemes,we present two Hierarchical Clustering(HC) algorithms:HC_TCP and HC_UDP,which can generate byte signatures from TCP and UDP packet payloads respectively.In particular,HC_TCP and HC_ UDP can extract the positions of byte signatures in packet payloads.Further,in order to deal with the case in which byte signatures cannot be derived,we develop an algorithm for generating bit signatures.Compared with the LASER algorithm and Suffix Tree(ST)-based algorithm,the proposed algorithms are better in terms of both classification accuracy and speed.Moreover,the experimental results indicate that,as long as the application-protocol header exists,it is possible to automatically derive reliable and accurate signatures combined with their positions in packet payloads.展开更多
The paper argues that a change of the name from multiculturalism to transculturalism will not work magic if the thinking paradigm that dictates trans- culturalism is still the same mindset that dictates multiculturali...The paper argues that a change of the name from multiculturalism to transculturalism will not work magic if the thinking paradigm that dictates trans- culturalism is still the same mindset that dictates multiculturalism, which is basi- cally swayed by postcolonialism, a victim mentality, or what Fanon termed as a colonized mind that conceives the world ahistorically in terms of a false binarism of the West and the non-West, ignoring entirely the complexities of power relations in intercultural and intracultural interactions, and disregarding the simple facts that, as the West is not a colonizing whole, the non-West is not a colonized monolith and that, as there are diversities between cultures in the West and the non-West, there are differences within the Western cultures, within the non-Western cultures, and within each culture. I discuss the failures of multiculturalism, critique the indiscriminate application of postcolonialism, and look into the problems and risks of conceiving power relations in cross-cultural interactions along the postcolonialist binary line, which has reduced the diversified world into the West and the non-West. The transculturalist hypothesis of World Englishes is used as a case in point. My conclusion is that transculturalism can only be meaningful if it adopts "a disposition of openness, liberated from the colonized mind or the postcolonialist identity politics.展开更多
基金supported by the National Natural Science Foundation of China under Grant No. 61271174
文摘By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files.
基金supported by the National Key Basic Research Program of China (973 Program) under Grant No. 2011CB302605the National High Technical Research and Development Program of China (863 Program) underGrants No. 2010AA012504,No. 2011AA010705+1 种基金the National Natural Science Foundation of China under Grant No. 60903166the National Science and Technology Support Program under Grants No. 2012BAH37B00,No. 2012-BAH37B01
文摘Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are matched through a search of the entire application data.On the basis of LW_DPI schemes,we present two Hierarchical Clustering(HC) algorithms:HC_TCP and HC_UDP,which can generate byte signatures from TCP and UDP packet payloads respectively.In particular,HC_TCP and HC_ UDP can extract the positions of byte signatures in packet payloads.Further,in order to deal with the case in which byte signatures cannot be derived,we develop an algorithm for generating bit signatures.Compared with the LASER algorithm and Suffix Tree(ST)-based algorithm,the proposed algorithms are better in terms of both classification accuracy and speed.Moreover,the experimental results indicate that,as long as the application-protocol header exists,it is possible to automatically derive reliable and accurate signatures combined with their positions in packet payloads.
文摘The paper argues that a change of the name from multiculturalism to transculturalism will not work magic if the thinking paradigm that dictates trans- culturalism is still the same mindset that dictates multiculturalism, which is basi- cally swayed by postcolonialism, a victim mentality, or what Fanon termed as a colonized mind that conceives the world ahistorically in terms of a false binarism of the West and the non-West, ignoring entirely the complexities of power relations in intercultural and intracultural interactions, and disregarding the simple facts that, as the West is not a colonizing whole, the non-West is not a colonized monolith and that, as there are diversities between cultures in the West and the non-West, there are differences within the Western cultures, within the non-Western cultures, and within each culture. I discuss the failures of multiculturalism, critique the indiscriminate application of postcolonialism, and look into the problems and risks of conceiving power relations in cross-cultural interactions along the postcolonialist binary line, which has reduced the diversified world into the West and the non-West. The transculturalist hypothesis of World Englishes is used as a case in point. My conclusion is that transculturalism can only be meaningful if it adopts "a disposition of openness, liberated from the colonized mind or the postcolonialist identity politics.