首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Outsourcing of Verifiable Composite Modular Exponentiations 可验证复合模幂的外包
Jie Liu, Bo Yang, Zhiguo Du
Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.
模幂运算作为一种基本运算被广泛应用于基于离散对数的密码协议中。目前研究的主要是对单素数模的外包求幂,而对复合模的外包求幂的研究却很少。本文分别针对可验证组合模幂和批处理组合模幂提出了两种新的安全外包协议。分析了协议的安全性和复杂性。我们的效率更高。
{"title":"Outsourcing of Verifiable Composite Modular Exponentiations","authors":"Jie Liu, Bo Yang, Zhiguo Du","doi":"10.1109/INCoS.2013.102","DOIUrl":"https://doi.org/10.1109/INCoS.2013.102","url":null,"abstract":"Modular exponentiation as a basic operation is widely used in discrete-log based cryptographic protocols. Most research has been made for outsourcing exponentiation modular a prime, works for outsourcing composite modular exponentiation are rare. In this paper, we propose two new secure outsourcing protocols for verifiable composite modular exponentiation and batch composite modular exponentiations respectively. We analyze the security and complexity of the protocols. Ours are more efficient.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Encryption Scheme for Scalable Video Coding Based on H.264 基于H.264的可扩展视频编码混合加密方案
Jianlong Zhang, Xinbao Gao
This paper presents a novel hybrid encryption scheme for scalable video coding based on h.264 standard. In the proposed scheme different domains of video are select to encrypt with different cipher algorithm according to the importance of data. These domains include intra-prediction mode, motion vector and residual data of base layer, and the data of the enhancement layer. LEX (Lead Extraction) algorithm is facilitated to encrypt base layer information. Encryption key of LEX is generated by using chaos cipher technology, the enhancement layer data is scrambled with random permutation algorithm based on chaotic system. Experiment show that our scheme can provide the computational efficiency, and higher security for h.264 SVC.
提出了一种基于h.264标准的可扩展视频编码混合加密方案。在该方案中,根据数据的重要性选择不同的视频域,使用不同的加密算法进行加密。这些领域包括内部预测模式、运动向量和基础层残差数据以及增强层数据。LEX (Lead Extraction)算法便于对基础层信息进行加密。LEX的加密密钥采用混沌密码技术生成,增强层数据采用基于混沌系统的随机排列算法进行置乱。实验表明,该方案能够提高h.264的计算效率和安全性SVC。
{"title":"A Hybrid Encryption Scheme for Scalable Video Coding Based on H.264","authors":"Jianlong Zhang, Xinbao Gao","doi":"10.1109/INCoS.2013.136","DOIUrl":"https://doi.org/10.1109/INCoS.2013.136","url":null,"abstract":"This paper presents a novel hybrid encryption scheme for scalable video coding based on h.264 standard. In the proposed scheme different domains of video are select to encrypt with different cipher algorithm according to the importance of data. These domains include intra-prediction mode, motion vector and residual data of base layer, and the data of the enhancement layer. LEX (Lead Extraction) algorithm is facilitated to encrypt base layer information. Encryption key of LEX is generated by using chaos cipher technology, the enhancement layer data is scrambled with random permutation algorithm based on chaotic system. Experiment show that our scheme can provide the computational efficiency, and higher security for h.264 SVC.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116872574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks 基于市场理论的认知无线网络动态信任阈值
Qingqi Pei, Conglin Wang, Zi Li
In Cognitive radio networks (CRNs) the primary users(PUs) and secondary users(SUs) share the spectrum resource, which can be an effective solution to the problem that the existing network spectrum utilization is not high. Therefore, to correctly sense whether the spectrum is idle or not is an important prerequisite for spectrum sharing. Spectrum sensing requires the secondary users to cooperate in sensing and report the sensed data. Therefore the CRN is subject to sensed data tampering and primary user emulation. The trustiness of the SUs is, therefore, very important. In this paper, the trust management is introduced to solve the problem of the trustiness of the SUs. A method of trust threshold value judgment is proposed for selecting the trust threshold in trust management. And the threshold will be a standard of the trustiness of SUs. Market equilibrium in the market theory is adopted. The demand function and supply function are built to find the trust value at the market equilibrium point. With the Beta distribution, the ultimate threshold will be given so that it can ensure the fairness of the SUs.
在认知无线网络(crn)中,主用户(pu)和从用户(su)共享频谱资源,可以有效解决现有网络频谱利用率不高的问题。因此,正确感知频谱是否空闲是实现频谱共享的重要前提。频谱感知需要辅助用户协同感知并上报感知数据。因此,CRN容易受到感知数据篡改和主用户仿真的影响。因此,美国的信任非常重要。本文引入信任管理来解决SUs的可信任性问题。针对信任管理中信任阈值的选择问题,提出了一种信任阈值判断方法。这个门槛将成为衡量美国政府可信度的标准。采用市场理论中的市场均衡。建立了需求函数和供给函数,求出了市场平衡点上的信任值。对于Beta分布,将给出最终阈值,以确保SUs的公平性。
{"title":"Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks","authors":"Qingqi Pei, Conglin Wang, Zi Li","doi":"10.1109/INCoS.2013.99","DOIUrl":"https://doi.org/10.1109/INCoS.2013.99","url":null,"abstract":"In Cognitive radio networks (CRNs) the primary users(PUs) and secondary users(SUs) share the spectrum resource, which can be an effective solution to the problem that the existing network spectrum utilization is not high. Therefore, to correctly sense whether the spectrum is idle or not is an important prerequisite for spectrum sharing. Spectrum sensing requires the secondary users to cooperate in sensing and report the sensed data. Therefore the CRN is subject to sensed data tampering and primary user emulation. The trustiness of the SUs is, therefore, very important. In this paper, the trust management is introduced to solve the problem of the trustiness of the SUs. A method of trust threshold value judgment is proposed for selecting the trust threshold in trust management. And the threshold will be a standard of the trustiness of SUs. Market equilibrium in the market theory is adopted. The demand function and supply function are built to find the trust value at the market equilibrium point. With the Beta distribution, the ultimate threshold will be given so that it can ensure the fairness of the SUs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122977831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Optimization for Cooperative Spectrum Sensing Based on Double Threshold Energy Detection 基于双阈值能量检测的协同频谱感知优化研究
Huiqin Liu, Shubin Wang, Fei Li, Shaowen Zhan
For double threshold energy detection of cooperative spectrum sensing in cognitive radio, which needs transfer much communication traffic and increases channel bandwidth and energy consumption of cognitive radio network, so an optimizational method is presented for the question in this paper. Depended on the detection probability of the network, while ensuring the performance of double threshold energy detection, the method search the best number of cognitive users participating cooperative detection to resolve the above question. Finally, the simulation results show the efficiency of this method.
针对认知无线电协同频谱感知中的双阈值能量检测需要传输大量通信流量,增加了认知无线电网络的信道带宽和能量消耗的问题,本文提出了一种优化方法。该方法根据网络的检测概率,在保证双阈值能量检测性能的前提下,搜索参与协同检测的最佳认知用户数量来解决上述问题。最后,仿真结果表明了该方法的有效性。
{"title":"Research on Optimization for Cooperative Spectrum Sensing Based on Double Threshold Energy Detection","authors":"Huiqin Liu, Shubin Wang, Fei Li, Shaowen Zhan","doi":"10.1109/INCoS.2013.118","DOIUrl":"https://doi.org/10.1109/INCoS.2013.118","url":null,"abstract":"For double threshold energy detection of cooperative spectrum sensing in cognitive radio, which needs transfer much communication traffic and increases channel bandwidth and energy consumption of cognitive radio network, so an optimizational method is presented for the question in this paper. Depended on the detection probability of the network, while ensuring the performance of double threshold energy detection, the method search the best number of cognitive users participating cooperative detection to resolve the above question. Finally, the simulation results show the efficiency of this method.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Android Contacts Synchronization System Based on the SyncML Protocol 基于SyncML协议的Android通讯录同步系统的设计与实现
Hao Yujie, Yan Chao
Android is becoming more and more popular. Up to the first half of 2012, the Android phone market share has reached 52.5%. Only consider smart phone, the ratio is even more than 75%. Contacts is very important to users. Contacts synchronization system allows the user contacts can be stored on a network server. Users can process their data via multiple clients. And server can ensure consistency and security of users' data. Therefore, based on SyncML protocol we designed and implemented a contacts synchronization system for Android. Existing Android contacts sync software generally use separate synchronization protocol. They export all the contacts data into a file, and apply rsnyc algorithm to find the changes. In contrast, we provider a new way to find changes and use the SyncML to implemente the sync system.
Android正变得越来越受欢迎。截至2012年上半年,安卓手机的市场份额已经达到了52.5%。仅考虑智能手机,这一比例甚至超过75%。联系人对用户来说非常重要。联系人同步系统允许将用户的联系人存储在网络服务器上。用户可以通过多个客户机处理他们的数据。服务器可以保证用户数据的一致性和安全性。因此,基于SyncML协议,我们设计并实现了一个Android通讯录同步系统。现有的Android通讯录同步软件一般使用单独的同步协议。他们将所有联系人数据导出到一个文件中,并应用rsnyc算法来查找更改。相反,我们提供了一种新的方法来查找更改并使用SyncML来实现同步系统。
{"title":"Design and Implementation of Android Contacts Synchronization System Based on the SyncML Protocol","authors":"Hao Yujie, Yan Chao","doi":"10.1109/INCOS.2013.131","DOIUrl":"https://doi.org/10.1109/INCOS.2013.131","url":null,"abstract":"Android is becoming more and more popular. Up to the first half of 2012, the Android phone market share has reached 52.5%. Only consider smart phone, the ratio is even more than 75%. Contacts is very important to users. Contacts synchronization system allows the user contacts can be stored on a network server. Users can process their data via multiple clients. And server can ensure consistency and security of users' data. Therefore, based on SyncML protocol we designed and implemented a contacts synchronization system for Android. Existing Android contacts sync software generally use separate synchronization protocol. They export all the contacts data into a file, and apply rsnyc algorithm to find the changes. In contrast, we provider a new way to find changes and use the SyncML to implemente the sync system.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128253564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency 时间关键组播数据源认证的博弈优化:安全与效率的权衡
Yichuan Wang, Jianfeng Ma, D. Lu, Liumei Zhang, Xiang Lu
Security and efficiency of messages transmission are crucial requirements for multicast data origin authentication, especially in time-critical scenarios, such as pay-TV and the smart grid. However, how to balance such equirements is still a difficult issue. Through analysis, we find that TV-HORS is more suitable for the time-critical scenarios than RSA-based and MAC-based scheme. However, the reuse times of TV-HORS scheme is still too small to suit some scenarios. In this paper, we present a Game Model of Multicast Data Origin Authentication (GMMDOA), to describe the relationship between security and efficiency for the time-critical multicast communication, contra posing the TV-HORS scheme. By analyzing our model with Shannons information and game theory, we propose an optimization scheme for update the private key. Through the security analysis of our model, the signature valid time is negligible compared with the adversary attacking time. Thus, the security of our scheme is still secure even in the lowest risk-level parameter. We present measurement results from experiments and discuss performance comparisons. It shows that, our scheme does significantly to promote the efficiency of multicast data origin authentication.
消息传输的安全性和效率是多播数据源认证的关键要求,特别是在付费电视和智能电网等时间紧迫的场景中。然而,如何平衡这些需求仍然是一个难题。通过分析,我们发现TV-HORS比基于rsa和mac的方案更适合于时间关键场景。但是,TV-HORS方案的重用次数仍然太小,无法适应某些场景。针对TV-HORS方案,提出了一种组播数据源认证(GMMDOA)的博弈模型,以描述时间关键型组播通信的安全性与效率之间的关系。利用香农信息和博弈论对模型进行分析,提出了一种更新私钥的优化方案。通过对模型的安全性分析,签名的有效时间与攻击者的攻击时间相比可以忽略不计。因此,即使在最低的风险级别参数下,我们的方案的安全性仍然是安全的。我们介绍了实验的测量结果,并讨论了性能比较。结果表明,该方案显著提高了组播数据源认证的效率。
{"title":"Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency","authors":"Yichuan Wang, Jianfeng Ma, D. Lu, Liumei Zhang, Xiang Lu","doi":"10.1109/INCoS.2013.51","DOIUrl":"https://doi.org/10.1109/INCoS.2013.51","url":null,"abstract":"Security and efficiency of messages transmission are crucial requirements for multicast data origin authentication, especially in time-critical scenarios, such as pay-TV and the smart grid. However, how to balance such equirements is still a difficult issue. Through analysis, we find that TV-HORS is more suitable for the time-critical scenarios than RSA-based and MAC-based scheme. However, the reuse times of TV-HORS scheme is still too small to suit some scenarios. In this paper, we present a Game Model of Multicast Data Origin Authentication (GMMDOA), to describe the relationship between security and efficiency for the time-critical multicast communication, contra posing the TV-HORS scheme. By analyzing our model with Shannons information and game theory, we propose an optimization scheme for update the private key. Through the security analysis of our model, the signature valid time is negligible compared with the adversary attacking time. Thus, the security of our scheme is still secure even in the lowest risk-level parameter. We present measurement results from experiments and discuss performance comparisons. It shows that, our scheme does significantly to promote the efficiency of multicast data origin authentication.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"23 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Three-Dimensional Digital Earth Application Development Framework and Its Applications 三维数字地球应用开发框架及其应用
Zenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li
Digital Earth has the extraordinary ability of integrating multi-source, heterogeneous, multi-scale spatial and temporal information with three dimensional, dynamic and interactive features and provides abundant visualization methods of temporal analysis and statistics. A kind of novel applications were developed based on Three-dimensional Digital Earth Application Development Framework, namely WikiGlobe ADF. It provides a new perspective for people understand and discover various kinds of knowledge about our living planet. These applications can be widely used in fields of education, humanity, history and tourism. Their properties of user participation and lightweight can satisfy the needs of developing personalized thematic applications and provide a well-interactive platform of spatial information service for the public. In this paper, the application characters and current trends of digital earth was analyzed, and architecture of WikiGlobe ADF was described then, the features and the realization mechanism of the framework were discussed. Based on the work above, several examples developed through the WikiGlobe ADF were presented.
数字地球具有非凡的多源、异构、多尺度时空信息的三维、动态、交互集成能力,提供了丰富的时间分析和统计可视化方法。基于三维数字地球应用开发框架WikiGlobe ADF开发了一种新型应用。它为人们了解和发现我们生活的星球的各种知识提供了一个新的视角。这些应用可以广泛应用于教育、人文、历史、旅游等领域。其用户参与性和轻量化的特点可以满足开发个性化专题应用的需求,为公众提供一个交互性良好的空间信息服务平台。分析了数字地球的应用特点和发展趋势,介绍了WikiGlobe ADF的体系结构,讨论了该框架的特点和实现机制。基于上述工作,介绍了通过WikiGlobe ADF开发的几个示例。
{"title":"On Three-Dimensional Digital Earth Application Development Framework and Its Applications","authors":"Zenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li","doi":"10.1109/INCoS.2013.147","DOIUrl":"https://doi.org/10.1109/INCoS.2013.147","url":null,"abstract":"Digital Earth has the extraordinary ability of integrating multi-source, heterogeneous, multi-scale spatial and temporal information with three dimensional, dynamic and interactive features and provides abundant visualization methods of temporal analysis and statistics. A kind of novel applications were developed based on Three-dimensional Digital Earth Application Development Framework, namely WikiGlobe ADF. It provides a new perspective for people understand and discover various kinds of knowledge about our living planet. These applications can be widely used in fields of education, humanity, history and tourism. Their properties of user participation and lightweight can satisfy the needs of developing personalized thematic applications and provide a well-interactive platform of spatial information service for the public. In this paper, the application characters and current trends of digital earth was analyzed, and architecture of WikiGlobe ADF was described then, the features and the realization mechanism of the framework were discussed. Based on the work above, several examples developed through the WikiGlobe ADF were presented.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Jain Fairness Index of Per-Entity Allocation Features for Fair and Efficient Allocation of Network Resources 面向网络资源公平有效分配的每实体分配特征的多jain公平性指标
M. Köppen, K. Ohnishi, M. Tsuru
Due to its simplicity and its easy comprehension, Jain's fairness index is still among the most popular measures to compare justness of allocations. However, it was already argued in the original paper that while the way of computing the index is well established, it is not immediately clear to which metric to apply the computation. Thereby, metric stands for a specific choice of a system observable. Here we study the extension of Jain's index to multiple metrics at once. We propose a set of per-entity allocation features to represent justness of an allocation, and to derive corresponding vectors of feature-wise taken Jain's fairness indices. The features give a numerical representation of fulfilling common fairness properties like proportionality, envy-freeness and equity of an allocation. Then, maximizing the smallest index gives an efficient procedure for allocation of goods. We study this procedure for the problem of allocating wireless channels in a multi-user setup and compare the influence of the various feature choices on the efficiency of the solution.
由于其简单易懂,Jain公平性指数仍然是比较分配公平性最常用的指标之一。然而,在原始论文中已经提出,虽然计算指数的方法已经建立,但并不立即清楚将计算应用于哪个度量。因此,度量代表系统可观察对象的特定选择。本文研究了Jain指标对多个度量的扩展。我们提出了一组代表分配公平性的每实体分配特征,并推导出相应的特征取Jain公平性指数向量。这些特征给出了一个数字表示,以满足常见的公平属性,如比例性、免嫉妒性和分配的公平性。然后,最大化最小指数给出了一个有效的货物分配程序。我们研究了在多用户设置下无线信道分配问题的这种方法,并比较了各种特征选择对解决方案效率的影响。
{"title":"Multi-Jain Fairness Index of Per-Entity Allocation Features for Fair and Efficient Allocation of Network Resources","authors":"M. Köppen, K. Ohnishi, M. Tsuru","doi":"10.1109/INCoS.2013.161","DOIUrl":"https://doi.org/10.1109/INCoS.2013.161","url":null,"abstract":"Due to its simplicity and its easy comprehension, Jain's fairness index is still among the most popular measures to compare justness of allocations. However, it was already argued in the original paper that while the way of computing the index is well established, it is not immediately clear to which metric to apply the computation. Thereby, metric stands for a specific choice of a system observable. Here we study the extension of Jain's index to multiple metrics at once. We propose a set of per-entity allocation features to represent justness of an allocation, and to derive corresponding vectors of feature-wise taken Jain's fairness indices. The features give a numerical representation of fulfilling common fairness properties like proportionality, envy-freeness and equity of an allocation. Then, maximizing the smallest index gives an efficient procedure for allocation of goods. We study this procedure for the problem of allocating wireless channels in a multi-user setup and compare the influence of the various feature choices on the efficiency of the solution.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Revocable Identity-Based Signature without Pairing 可撤销的基于身份的无配对签名
Yinxia Sun, Futai Zhang, Limin Shen, R. Deng
In an identity based cryptosystem, a user's identity is used as its public key. So, a digital certificate is no longer needed for the authenticity of a public key. However, a necessary problem arises: how to prove that a user is revoked or non-revoked? The ideal revocation mechanism is to update every user's private key at every time period by the private key generater (PKG). Most of the existing works are revocable identity based encryption. In this paper, we present a revocable identity based signature scheme, which is more efficient than previous solutions. In our scheme, a user's private key is composed of both an initial private key and a time key. The time key is periodically updated by PKG, and is transmitted over a public channel. In addition, the new scheme does not use the expensive bilinear pairings. Formal security proofs are provided in the random oracle model under the standard Discrete Logarithm assumption. We also extend the new scheme to be decryption-key-exposure resilient.
在基于身份的密码系统中,用户的身份被用作其公钥。因此,不再需要数字证书来保证公钥的真实性。但是,出现了一个必要的问题:如何证明用户已被撤销或未被撤销?理想的撤销机制是由私钥生成器(PKG)在每个时间段更新每个用户的私钥。现有的大部分工作都是基于可撤销身份的加密。在本文中,我们提出了一个可撤销的基于身份的签名方案,该方案比以前的方案更有效。在我们的方案中,用户的私钥由初始私钥和时间密钥组成。时间密钥由PKG定期更新,并通过公共通道传输。此外,新方案不使用昂贵的双线性对。在标准离散对数假设下,给出了随机oracle模型的形式化安全性证明。我们还扩展了新方案,使其具有解密密钥暴露的弹性。
{"title":"Revocable Identity-Based Signature without Pairing","authors":"Yinxia Sun, Futai Zhang, Limin Shen, R. Deng","doi":"10.1109/INCoS.2013.68","DOIUrl":"https://doi.org/10.1109/INCoS.2013.68","url":null,"abstract":"In an identity based cryptosystem, a user's identity is used as its public key. So, a digital certificate is no longer needed for the authenticity of a public key. However, a necessary problem arises: how to prove that a user is revoked or non-revoked? The ideal revocation mechanism is to update every user's private key at every time period by the private key generater (PKG). Most of the existing works are revocable identity based encryption. In this paper, we present a revocable identity based signature scheme, which is more efficient than previous solutions. In our scheme, a user's private key is composed of both an initial private key and a time key. The time key is periodically updated by PKG, and is transmitted over a public channel. In addition, the new scheme does not use the expensive bilinear pairings. Formal security proofs are provided in the random oracle model under the standard Discrete Logarithm assumption. We also extend the new scheme to be decryption-key-exposure resilient.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Creation of Customer Evaluation Model in the Catering Industry Supply Chain Ecosystem 餐饮业供应链生态系统中顾客评价模型的建立
Kai Wei, J. Gou, Rui Chai, W. Dai
In recent years, China's catering industry competition fierce increasingly, which dramatically accelerated the rapid evolution of the industry ecosystem and business development model. Reality, catering industry supply chain management services are moving towards specialization and diversification. However, there still confront many problems in the corporate positioning, selection of the operating and external business. First, starting from the definition of the catering industry supply chain ecosystem, this paper analyzes the different actors in the supply chain ecosystem. We discussed the process and characteristics of the supply chain in catering industry supply chain secondly. Then, the related evaluation model which impress on mathematical model is established between the catering industry supply chain service providers and customers.
近年来,中国餐饮行业竞争日趋激烈,这极大地加速了行业生态系统和商业发展模式的快速演变。现实中,餐饮业供应链管理服务正朝着专业化和多元化的方向发展。但在企业定位、经营选择、对外业务等方面仍面临诸多问题。首先,本文从餐饮业供应链生态系统的定义入手,分析了供应链生态系统中的不同行为主体。其次论述了餐饮行业供应链的流程和特点。然后,在数学模型的基础上,建立了餐饮业供应链服务提供商与顾客之间的相关评价模型。
{"title":"Creation of Customer Evaluation Model in the Catering Industry Supply Chain Ecosystem","authors":"Kai Wei, J. Gou, Rui Chai, W. Dai","doi":"10.1109/INCoS.2013.144","DOIUrl":"https://doi.org/10.1109/INCoS.2013.144","url":null,"abstract":"In recent years, China's catering industry competition fierce increasingly, which dramatically accelerated the rapid evolution of the industry ecosystem and business development model. Reality, catering industry supply chain management services are moving towards specialization and diversification. However, there still confront many problems in the corporate positioning, selection of the operating and external business. First, starting from the definition of the catering industry supply chain ecosystem, this paper analyzes the different actors in the supply chain ecosystem. We discussed the process and characteristics of the supply chain in catering industry supply chain secondly. Then, the related evaluation model which impress on mathematical model is established between the catering industry supply chain service providers and customers.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1