Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation meth...Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition.展开更多
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. Fir...According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.展开更多
In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed i...In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible.展开更多
E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of ...E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.展开更多
Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the r...Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost.展开更多
Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow expo...Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow export engine with an enhanced and extensible data structure, called XFix, on the basis of a GPL tool,-nProbe.In the engine, we use an extensible two-dimensional hash table for flow aggregation, which is able to improve the performance of the metering process as well as support bidirectional flow.Experimental results have shown its efficiency in multi-thread processing activity.展开更多
For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distri...For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory.展开更多
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio...With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t...In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network.展开更多
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso...To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.展开更多
Today, Social Networking Sites (SNS), online forum, and e-mail communication have become a daily phenomenon in Indonesia. Thousands and even millions of the people have been using Blog, Facebook, MySpace, Twitter, a...Today, Social Networking Sites (SNS), online forum, and e-mail communication have become a daily phenomenon in Indonesia. Thousands and even millions of the people have been using Blog, Facebook, MySpace, Twitter, and others as a communication medium. Many of them are mobile connected and have made it a daily practices. Interestingly, all these changes are not followed by Onmi International Hospital which it ultimately in 2009 led to the crisis. This crisis was beginning from the customer, Prita Mulyasari, who felt disappointed at the hospital service, and wrote an e-mail to her friend. Suddenly, in a short time the e-mail was disseminated widely on the Internet and produced a lot of support and public humiliation to the Omni International Hospital. This paper aims at explaining the cybcr crisis experienced by Omni International Hospital and how to overcome the problem at corporate level.展开更多
Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of th...Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of third author is incorrect.The correct name is Jae-Young PYUN.2)The information of corresponding author is incorrect.The correct information should be Goo-Rak KWON,Professor,PhD;Tel/Fax:+98-711-7264102;E-mail:grkwon@chosun.ac.kr展开更多
In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processe...In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processes of e+e-(γγ)→tcht0 at the International Linear Collider (ILC). It is found that these rare processes production rates can be enhanced significantly in the TC2 model. Especially for the process γγ→tcht0, the total cross section will reach a few fb in the reasonable parameter space. We also calculate the distributions of transverse momenta, pseudo-rapid and invariant mass of the top-higgs. In view of the main decay modes of top-higgs for mho 〈 2mr, we find that there will be several hundreds FCNC events produced at the ILC with annually integral luminosity of 500 fb-1. Due to the clean background, such FCNC signals can possibly be detected at the ILC.展开更多
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution...Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies.展开更多
Tandem learning via email and computer-mediated communication activities flanked standard frontal English lessons for Italian adult learners in Italy. It is here suggested that the combination of tandem learning, vari...Tandem learning via email and computer-mediated communication activities flanked standard frontal English lessons for Italian adult learners in Italy. It is here suggested that the combination of tandem learning, various communication activities performed on-line, and standard courses help mature students to boost their self-esteem, give them more autonomy, and enhance their motivation. Tandem learning, which is based on the principles of reciprocity and autonomy, is ideally suited for adult students. It helps overcome the problems connected to the affective reactions of adults, and at the same time, being content driven, offers a more natural setting to learn an L2 (second language) on a mutual supportive basis.展开更多
Theater play that shows how textiles, make up, hair dyes and music players has changed along the last six decades, especially due to polymers. It is a play that has a historic, chemical and musical side that introduce...Theater play that shows how textiles, make up, hair dyes and music players has changed along the last six decades, especially due to polymers. It is a play that has a historic, chemical and musical side that introduces the use of ICT (information and communications technology), such as Faeebook, Moodle platform, Web sites, E-mail, Word, Publisher, PowerPoint, Videos and Digital music. Results in the conduct of the students that participated: assertiveness, self-esteem, tolerance, cooperation, responsibility and teamwork, all of them significantly contributed a meaningful learning about the polymers.展开更多
We represent a two-dimensional model of polydisperse granular mixtures with a power-law size distribution. The model consists of smooth hard disks in a rectangular box with inelastic collisions,driven by a homogeneous...We represent a two-dimensional model of polydisperse granular mixtures with a power-law size distribution. The model consists of smooth hard disks in a rectangular box with inelastic collisions,driven by a homogeneous heat bath at zero gravity.The width of particle size distribution is characterized by the only parameter,namely,the fractal dimension D.The energy dissipation of the mixture is increased as D increases or as e decreases.Furthermore,it is found that the steady-state properties of the mixture such as the collision rate,granular temperature,kinetic pressure and velocity distribution depend sensitively on size distribution parameter D.展开更多
文摘Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.
基金supported by the Doctor Sustention Foundation of Telecommunication Engineering Institute,Air Force Engineering University (No.KDYBSJJ08605)the Key Laboratory Foundation of National Defense Science and Technology (No.9140c860302)
文摘In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible.
基金sponsored by the National Natural Science Foundation of China under grant number No. 61100008, 61201084the China Postdoctoral Science Foundation under Grant No. 2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund (Postdoctoral Youth Talent Program) under Grant No. LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No. LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No. QC2015076Funds for the Central Universities of China under grant number HEUCF100602
文摘E-mail communication network evolution model based on user information propagation is studied. First, mathematical representation of weighted e-mail communication network is proposed, and network center parameters of Enron dataset and the distribution of node degree and strength are analyzed. Then, some rules of e-mail communication network evolution are found. Second, the model of e-mail information propagation is described, and e-mail communication network evolution model based on user information propagation is proposed. Lastly, the simulation proves the correctness of the distribution characteristic of degree and strength of the model proposed and then verifies that the model proposed is closer to the real situation of e-mail communication network through parameter comparison. This research provides the basis for other researches on social network evolution and data communication.
基金supported in part by 973 program under con-tract 2007CB307101National High Technology of China ("863 program") under contract No. 2008AA01A326 National Natural Science Foundation of China under Grant No. 60870015 and No. 60833002
文摘Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost.
文摘Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow export engine with an enhanced and extensible data structure, called XFix, on the basis of a GPL tool,-nProbe.In the engine, we use an extensible two-dimensional hash table for flow aggregation, which is able to improve the performance of the metering process as well as support bidirectional flow.Experimental results have shown its efficiency in multi-thread processing activity.
文摘For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory.
文摘With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
基金Supported by the Promotive Research Fund for Excellent Young and Middle-aged Scientists of Shandong Province(No.BS2010DX010)the Project of Higher Educational Science and Technology Program of Shandong Province(No.J12LN36)
文摘In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network.
基金Supported by the National Basic Research Program of China(973 Program)(No.2011CB302903)the National Natural Science Foundation of China(No.61100213)+3 种基金the Key Program of Natural Science for Universities of Jiangsu Province(No.10KJA510035)the Specialized Research Fund for the Doctoral Program of Higher Education(20113223120007)the Science and Technology Program of Nanjing(201103003)the Postgraduate Innovation Project Foundation of Jiangsu Province(No.CXLX11_0411)
文摘To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks.
文摘Today, Social Networking Sites (SNS), online forum, and e-mail communication have become a daily phenomenon in Indonesia. Thousands and even millions of the people have been using Blog, Facebook, MySpace, Twitter, and others as a communication medium. Many of them are mobile connected and have made it a daily practices. Interestingly, all these changes are not followed by Onmi International Hospital which it ultimately in 2009 led to the crisis. This crisis was beginning from the customer, Prita Mulyasari, who felt disappointed at the hospital service, and wrote an e-mail to her friend. Suddenly, in a short time the e-mail was disseminated widely on the Internet and produced a lot of support and public humiliation to the Omni International Hospital. This paper aims at explaining the cybcr crisis experienced by Omni International Hospital and how to overcome the problem at corporate level.
文摘Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of third author is incorrect.The correct name is Jae-Young PYUN.2)The information of corresponding author is incorrect.The correct information should be Goo-Rak KWON,Professor,PhD;Tel/Fax:+98-711-7264102;E-mail:grkwon@chosun.ac.kr
基金Supported in part by the National Natural Science Foundation of China (NNSFC) under Grant Nos.10975047,10979008,and 10775039 Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20094104110001
文摘In the context of the top-color-assisted technicolor (TC2) model, the flavor-changing neutral-current (FCNC) interaction induced by the top-higgs (hOt) are predicted at tree level. We study the relevant processes of e+e-(γγ)→tcht0 at the International Linear Collider (ILC). It is found that these rare processes production rates can be enhanced significantly in the TC2 model. Especially for the process γγ→tcht0, the total cross section will reach a few fb in the reasonable parameter space. We also calculate the distributions of transverse momenta, pseudo-rapid and invariant mass of the top-higgs. In view of the main decay modes of top-higgs for mho 〈 2mr, we find that there will be several hundreds FCNC events produced at the ILC with annually integral luminosity of 500 fb-1. Due to the clean background, such FCNC signals can possibly be detected at the ILC.
基金the National Key Basic Research Program of China (Grant: 2013CB834204)the National Natural Science Foundation of China (Grant: 61300242, 61772291)+1 种基金the Tianjin Research Program of Application Foundation and Advanced Technology (Grant: 15JCQNJC41500, 17JCZDJC30500)the Open Project Foundation of Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China (Grant: CAAC-ISECCA- 201701, CAAC-ISECCA-201702)
文摘Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies.
文摘Tandem learning via email and computer-mediated communication activities flanked standard frontal English lessons for Italian adult learners in Italy. It is here suggested that the combination of tandem learning, various communication activities performed on-line, and standard courses help mature students to boost their self-esteem, give them more autonomy, and enhance their motivation. Tandem learning, which is based on the principles of reciprocity and autonomy, is ideally suited for adult students. It helps overcome the problems connected to the affective reactions of adults, and at the same time, being content driven, offers a more natural setting to learn an L2 (second language) on a mutual supportive basis.
文摘Theater play that shows how textiles, make up, hair dyes and music players has changed along the last six decades, especially due to polymers. It is a play that has a historic, chemical and musical side that introduces the use of ICT (information and communications technology), such as Faeebook, Moodle platform, Web sites, E-mail, Word, Publisher, PowerPoint, Videos and Digital music. Results in the conduct of the students that participated: assertiveness, self-esteem, tolerance, cooperation, responsibility and teamwork, all of them significantly contributed a meaningful learning about the polymers.
基金Supported by the National Natural Science Foundation of China under Grant Nos.10675048 and 1068006
文摘We represent a two-dimensional model of polydisperse granular mixtures with a power-law size distribution. The model consists of smooth hard disks in a rectangular box with inelastic collisions,driven by a homogeneous heat bath at zero gravity.The width of particle size distribution is characterized by the only parameter,namely,the fractal dimension D.The energy dissipation of the mixture is increased as D increases or as e decreases.Furthermore,it is found that the steady-state properties of the mixture such as the collision rate,granular temperature,kinetic pressure and velocity distribution depend sensitively on size distribution parameter D.