期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
工业发达国家邮政发展趋势(上)
1
作者 周焕德 王之雄 《邮政管理与技术》 1996年第3期24-27,共4页
关键词 邮政 发展趋势 对策 发达国家 邮电'
下载PDF
ESTIMATION METHOD OF AIRSPACE CONNECTIVITY PROBABILITY IN MILITARY AANET 被引量:2
2
作者 Luo Changyuan Song Yulong Pang Songchao 《Journal of Electronics(China)》 2013年第6期538-546,共9页
Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation meth... Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition. 展开更多
关键词 Aeronautical ad hoc network (AANET) Military aviation Mobility model Con-nectivity Airspace Unit Circle (AUC)
下载PDF
Formal analysis of robust email protocol based on authentication tests 被引量:1
3
作者 蒋睿 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2009年第2期147-151,共5页
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m... Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy. 展开更多
关键词 email protocol authentication tests formal method perfect forward secrecy strand space model
下载PDF
Improvements on robust email protocols with perfect forward secrecy
4
作者 蒋睿 胡爱群 杨晓辉 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期139-142,共4页
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir... According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols. 展开更多
关键词 man-in-the-middle attack EMAIL network security perfect forward secrecy
下载PDF
Research on the Synchronization of Modulation Hopping System:I Synchronization Scheme 被引量:2
5
作者 Tai Nengjian Wu Dewei +1 位作者 Wu Jie Li Ting 《China Communications》 SCIE CSCD 2009年第4期148-154,共7页
In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed i... In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible. 展开更多
关键词 secure communication modulation hopping SYNCHRONIZATION
下载PDF
Research on E-mail Communication Network Evolution Model Based on User Information Propagation 被引量:1
6
作者 ZHANG Lejun GUO Lin XU Li 《China Communications》 SCIE CSCD 2015年第7期108-118,共11页
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ... E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication. 展开更多
关键词 E-MAIL social network analysis network evolution information propagation
下载PDF
The Performance Analysis of the THMLD-based Mobile Multicast Method
7
作者 Guan Jianfeng Zhou Huachun +1 位作者 Li Xin Zhang Hongke 《China Communications》 SCIE CSCD 2009年第4期127-135,共9页
Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the r... Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost. 展开更多
关键词 mobile multicast MLD BT RS join delay COST
下载PDF
An Enhanced and Extensible Data Structure for Flow Export Engine
8
作者 Zhang Pei Huang Xiaohong +1 位作者 Jiang Xiaoxiao Ma Yan 《China Communications》 SCIE CSCD 2009年第4期121-126,共6页
Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow expo... Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow export engine with an enhanced and extensible data structure, called XFix, on the basis of a GPL tool,-nProbe.In the engine, we use an extensible two-dimensional hash table for flow aggregation, which is able to improve the performance of the metering process as well as support bidirectional flow.Experimental results have shown its efficiency in multi-thread processing activity. 展开更多
关键词 network monitoring flow exporting bidirectional flow two-dimensional hash table IPFIX
下载PDF
Precise Transformation of Feistel to SP Fuse into LFSR
9
作者 Luo Lan Qu Zehui Song Chaoming 《China Communications》 SCIE CSCD 2009年第4期168-171,共4页
For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distri... For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory. 展开更多
关键词 block cipher algorithm precise transformation merit of SP structure fuse in LFSR
下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
10
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
11
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
12
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 Data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression Data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
13
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography
下载PDF
Corporate Cyber-Crisis: A Case Study of Omni Intemational Hospital in Indonesia
14
作者 Helpis Esmswara 《Journal of Modern Accounting and Auditing》 2011年第8期878-890,共13页
Today, Social Networking Sites (SNS), online forum, and e-mail communication have become a daily phenomenon in Indonesia. Thousands and even millions of the people have been using Blog, Facebook, MySpace, Twitter, a... Today, Social Networking Sites (SNS), online forum, and e-mail communication have become a daily phenomenon in Indonesia. Thousands and even millions of the people have been using Blog, Facebook, MySpace, Twitter, and others as a communication medium. Many of them are mobile connected and have made it a daily practices. Interestingly, all these changes are not followed by Onmi International Hospital which it ultimately in 2009 led to the crisis. This crisis was beginning from the customer, Prita Mulyasari, who felt disappointed at the hospital service, and wrote an e-mail to her friend. Suddenly, in a short time the e-mail was disseminated widely on the Internet and produced a lot of support and public humiliation to the Omni International Hospital. This paper aims at explaining the cybcr crisis experienced by Omni International Hospital and how to overcome the problem at corporate level. 展开更多
关键词 digital society era corporate crisis STAKEHOLDERS public relations
下载PDF
Erratum to: An advanced segmentation using area and boundary tracing technique in extraction of lungs region
15
作者 Kiran THAPALIYA Sang-Woong LEE +2 位作者 Jae-Young PYU Heon JEONG Goo-Rak KWON 《Journal of Central South University》 SCIE EI CAS 2014年第12期4762-4762,共1页
Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of th... Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of third author is incorrect.The correct name is Jae-Young PYUN.2)The information of corresponding author is incorrect.The correct information should be Goo-Rak KWON,Professor,PhD;Tel/Fax:+98-711-7264102;E-mail:grkwon@chosun.ac.kr 展开更多
关键词 segmentation corrected tracing contained lungs Heidelberg supervised Berlin updated incomplete
下载PDF
Searching for Flavor-Changing Neutral-Current Signals via e^+e^-(γγ)→th_t^0 in Topcolor-Assisted Technicolor Model
16
作者 鲁公儒 韩金钟 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1091-1096,共6页
In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processe... In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processes of e+e-(γγ)→tcht0 at the International Linear Collider (ILC). It is found that these rare processes production rates can be enhanced significantly in the TC2 model. Especially for the process γγ→tcht0, the total cross section will reach a few fb in the reasonable parameter space. We also calculate the distributions of transverse momenta, pseudo-rapid and invariant mass of the top-higgs. In view of the main decay modes of top-higgs for mho 〈 2mr, we find that there will be several hundreds FCNC events produced at the ILC with annually integral luminosity of 500 fb-1. Due to the clean background, such FCNC signals can possibly be detected at the ILC. 展开更多
关键词 top quark flavor-changing neutral-current international linear collider
下载PDF
A Learning Evasive Email-Based P2P-Like Botnet
17
作者 Zhi Wang Meilin Qin +2 位作者 Mengqi Chen Chunfu Jia Yong Ma 《China Communications》 SCIE CSCD 2018年第2期15-24,共10页
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution... Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies. 展开更多
关键词 MALWARE BOTNET learning evasion command and control
下载PDF
Learning L2 English in Tandem Partnerships On-Line
18
作者 Noccetti Sabrina 《Sino-US English Teaching》 2012年第7期1318-1324,共7页
Tandem learning via email and computer-mediated communication activities flanked standard frontal English lessons for Italian adult learners in Italy. It is here suggested that the combination of tandem learning, vari... Tandem learning via email and computer-mediated communication activities flanked standard frontal English lessons for Italian adult learners in Italy. It is here suggested that the combination of tandem learning, various communication activities performed on-line, and standard courses help mature students to boost their self-esteem, give them more autonomy, and enhance their motivation. Tandem learning, which is based on the principles of reciprocity and autonomy, is ideally suited for adult students. It helps overcome the problems connected to the affective reactions of adults, and at the same time, being content driven, offers a more natural setting to learn an L2 (second language) on a mutual supportive basis. 展开更多
关键词 computer-mediated communication content and language integrated learning L2 (second language)learning tandem partnership
下载PDF
Chemistry, Theater, Information and Communications Technology
19
作者 Maria de los Angeles Montiel Montoya Celia Sanchez Mendoza Graciela Martinez de Jesus 《Journal of Chemistry and Chemical Engineering》 2015年第3期221-226,共6页
Theater play that shows how textiles, make up, hair dyes and music players has changed along the last six decades, especially due to polymers. It is a play that has a historic, chemical and musical side that introduce... Theater play that shows how textiles, make up, hair dyes and music players has changed along the last six decades, especially due to polymers. It is a play that has a historic, chemical and musical side that introduces the use of ICT (information and communications technology), such as Faeebook, Moodle platform, Web sites, E-mail, Word, Publisher, PowerPoint, Videos and Digital music. Results in the conduct of the students that participated: assertiveness, self-esteem, tolerance, cooperation, responsibility and teamwork, all of them significantly contributed a meaningful learning about the polymers. 展开更多
关键词 THEATER ICT POLYMER meaningful learning.
下载PDF
Steady-State Properties of Driven Polydisperse Granular Mixtures
20
作者 李睿 张端明 +1 位作者 肖明 李志浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1145-1148,共4页
We represent a two-dimensional model of polydisperse granular mixtures with a power-law size distribution. The model consists of smooth hard disks in a rectangular box with inelastic collisions,driven by a homogeneous... We represent a two-dimensional model of polydisperse granular mixtures with a power-law size distribution. The model consists of smooth hard disks in a rectangular box with inelastic collisions,driven by a homogeneous heat bath at zero gravity.The width of particle size distribution is characterized by the only parameter,namely,the fractal dimension D.The energy dissipation of the mixture is increased as D increases or as e decreases.Furthermore,it is found that the steady-state properties of the mixture such as the collision rate,granular temperature,kinetic pressure and velocity distribution depend sensitively on size distribution parameter D. 展开更多
关键词 fractal dimension polydisperse mixtures
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部