期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Blind spectrum sensing based on the ratio of mean square to variance 被引量:4
1
作者 Ye Yinghui Lu Guangyue 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第1期42-48,共7页
Anderson-Darling (AD) sensing, characteristic function (CF) sensing and order statistic (OS) sensing are three common spectrum sensing (SS) methods based on goodness of fit (GOF) testing. However, AD and OS ... Anderson-Darling (AD) sensing, characteristic function (CF) sensing and order statistic (OS) sensing are three common spectrum sensing (SS) methods based on goodness of fit (GOF) testing. However, AD and OS sensing needs the prior information of noise variance; CF and OS sensing have high computation complexity. To circumvent those difficulties, in this paper, the ratio of the mean square to variance (RM2V) of the samples, after deriving its probability density function (PDF), is employed as a test statistic to detect the availability of the vacant spectrum in the cognitive radio (CR) system. Then a blind SS method based on RM2V is proposed, which is dubbed as RM2V sensing, and its exact theoretical threshold is obtained via the derived PDF of RM2V. The performance of RM2V sensing is evaluated by theoretical analysis and Monte Carlo simulations. Comparing with the conventional energy detection (ED), AD, CF and OS sensing, RM2V sensing, with no need of noise variance, has advantages from the aspect of computation complexity and detection performance. 展开更多
关键词 cognitive radio spectrum sensing goodness of fit testing the ratio of the mean square to variance
原文传递
Fine-grained cooperative access control scheme with hidden policies
2
作者 Han Gang Xing Qixuan Zhang Yinghui 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期13-25,共13页
The traditional ciphertext policy attribute-based encryption(CP-ABE) has two problems: one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user's privacy inf... The traditional ciphertext policy attribute-based encryption(CP-ABE) has two problems: one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user's privacy information, the other is that it does not support collaborative decryption, which cannot meet the actual demand of conditional collaborative decryption among multiple users. In order to deal with the above two problems at the same time, a fine-grained cooperative access control scheme with hidden policies(FCAC-HP) is proposed based on the existing CP-ABE schemes combined with blockchain technology. In FCAC-HP scheme, users are grouped by group identifier so that only users within the same group can cooperate. In the data encryption stage, the access policy is encrypted and then embedded in the ciphertext to protect the privacy information of the access policy. In the data access stage, the anonymous attribute matching technology is introduced so that only matched users can decrypt ciphertext data to improve the efficiency of the system. In this process, a smart contract is used to execute the verification algorithm to ensure the credibility of the results. In terms of security, FCAC-HP scheme is based on the prime subgroup discriminative assumption and is proved to be indistinguishable under chosen plaintext attack(CPA) by dual system encryption technology. Experimental verification and analysis show that FCAC-HP scheme improves computational efficiency while implementing complex functions. 展开更多
关键词 attribute-based encryption hidden policy group collaboration blockchain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部