In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc...In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.展开更多
This paper is a contrastive study of two translated versions of an essay which are very different in language and register style. It comes to the conclusion that the translator has to follow the fundamental translatio...This paper is a contrastive study of two translated versions of an essay which are very different in language and register style. It comes to the conclusion that the translator has to follow the fundamental translation principle of functional equivalence, that is, to faithfully reproduce the linguistic and stylistic features of the original, while retaining the verbal beauty of the original as much as possible. Through contrastive analysis, this paper also argues that stylistic features should be consistent with the choice of word, syntactic structures, rhetorical devices, and overall textual layout.展开更多
文摘In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.
文摘This paper is a contrastive study of two translated versions of an essay which are very different in language and register style. It comes to the conclusion that the translator has to follow the fundamental translation principle of functional equivalence, that is, to faithfully reproduce the linguistic and stylistic features of the original, while retaining the verbal beauty of the original as much as possible. Through contrastive analysis, this paper also argues that stylistic features should be consistent with the choice of word, syntactic structures, rhetorical devices, and overall textual layout.