To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption...To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage.展开更多
In this paper, we present a theoretical analysis for linear finite element superconvergent gradient recovery on Par6 mesh, the dual of which is centroidal Voronoi tessellations with the lowest energy per unit volume a...In this paper, we present a theoretical analysis for linear finite element superconvergent gradient recovery on Par6 mesh, the dual of which is centroidal Voronoi tessellations with the lowest energy per unit volume and is the congruent cell predicted by the three-dimensional Gersho's conjecture. We show that the linear finite element solution uh and the linear interpolation uI have superclose gradient on Par6 meshes. Consequently, the gradient recovered from the finite element solution by using the superconvergence patch recovery method is superconvergent to Vu. A numerical example is presented to verify the theoretical result.展开更多
As administration ofblogs is one of the most popular activities on the Internet currently, topics related to blogs have also become a favorite subject in daily life. Questions like what ways can be used to show end-us...As administration ofblogs is one of the most popular activities on the Internet currently, topics related to blogs have also become a favorite subject in daily life. Questions like what ways can be used to show end-users' or designers' internal knowledge to find out their needs, what methods can be applied to analysis of the process, etc., have not been answered yet. Therefore, how to analyze the tacit knowledge and grasp the true demand of users is one of the major issues to be solved in empathic design. The purpose of this research is to examine the difference of whether the "comparison table of schema changes for users at three points of time" was taken into consideration or not in an empathic design brainstorming meeting. The tests consist of the experimental group and the control group. The former did not refer to the comparison table; however, the latter used it for discussion. The result indicates this comparison table helped the control group significantly in presenting an ultimate blog design of innovative ideas展开更多
A set of integrated Orthogonal Frequency Division Multiplexing(OFDM) modulation and demodulation system is proposed and its performance is verified in reference to the standard of IEEE802.16a for WMAN.The design,combi...A set of integrated Orthogonal Frequency Division Multiplexing(OFDM) modulation and demodulation system is proposed and its performance is verified in reference to the standard of IEEE802.16a for WMAN.The design,combined with analogy front-end,adopts Texas Instrument(TI) Company's 6701 evaluation module(EVM) to construct digital Intermediate Frequency(IF) platform.A DSP-based baseband processing software module is embedded into the system.The proposed scheme makes it possible for users to select various software modules to set up connections with different throughput performance.Taking into account the given hardware configuration,the design aims to optimize the algorithm modules to accomplish better system performance.展开更多
After analysis of the existing problems of traditional RBAC model, user group and resource domain are introduced to conduct finely granular extension of RBAC model. Extended model reduces the redundancy of roles, lowe...After analysis of the existing problems of traditional RBAC model, user group and resource domain are introduced to conduct finely granular extension of RBAC model. Extended model reduces the redundancy of roles, lowers the complexity of authorization management and enhances the flexibility and maintainability of users' authorization. It is well proved in its application in postgraduate student management system.展开更多
基金The National Natural Science Foundation of China(No.61372103)the Natural Science Foundation of Jiangsu Province(No.SBK2020020282)+1 种基金the Program of Key Laboratory of Information Network Security of the Ministry of Public Security(No.C19607)the Program of Key Laboratory of Computer Network Technology of Jiangsu Province.
文摘To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage.
基金supported by Singapore AcRF RG59/08 (M52110092)Singapore NRF 2007 IDM-IDM002-010.
文摘In this paper, we present a theoretical analysis for linear finite element superconvergent gradient recovery on Par6 mesh, the dual of which is centroidal Voronoi tessellations with the lowest energy per unit volume and is the congruent cell predicted by the three-dimensional Gersho's conjecture. We show that the linear finite element solution uh and the linear interpolation uI have superclose gradient on Par6 meshes. Consequently, the gradient recovered from the finite element solution by using the superconvergence patch recovery method is superconvergent to Vu. A numerical example is presented to verify the theoretical result.
文摘As administration ofblogs is one of the most popular activities on the Internet currently, topics related to blogs have also become a favorite subject in daily life. Questions like what ways can be used to show end-users' or designers' internal knowledge to find out their needs, what methods can be applied to analysis of the process, etc., have not been answered yet. Therefore, how to analyze the tacit knowledge and grasp the true demand of users is one of the major issues to be solved in empathic design. The purpose of this research is to examine the difference of whether the "comparison table of schema changes for users at three points of time" was taken into consideration or not in an empathic design brainstorming meeting. The tests consist of the experimental group and the control group. The former did not refer to the comparison table; however, the latter used it for discussion. The result indicates this comparison table helped the control group significantly in presenting an ultimate blog design of innovative ideas
文摘A set of integrated Orthogonal Frequency Division Multiplexing(OFDM) modulation and demodulation system is proposed and its performance is verified in reference to the standard of IEEE802.16a for WMAN.The design,combined with analogy front-end,adopts Texas Instrument(TI) Company's 6701 evaluation module(EVM) to construct digital Intermediate Frequency(IF) platform.A DSP-based baseband processing software module is embedded into the system.The proposed scheme makes it possible for users to select various software modules to set up connections with different throughput performance.Taking into account the given hardware configuration,the design aims to optimize the algorithm modules to accomplish better system performance.
文摘After analysis of the existing problems of traditional RBAC model, user group and resource domain are introduced to conduct finely granular extension of RBAC model. Extended model reduces the redundancy of roles, lowers the complexity of authorization management and enhances the flexibility and maintainability of users' authorization. It is well proved in its application in postgraduate student management system.