首页 > 最新文献

2010 International Conference on Networking and Digital Society最新文献

英文 中文
Querying encrypted character data in DAS model 查询DAS模型中的加密字符数据
Pub Date : 2010-06-07 DOI: 10.1109/ICNDS.2010.5479313
Nian Liu, Yajian Zhou, Xinxin Niu, Yixian Yang
There has been increasing concern about Databaseas-a-Service(DAS) architectures. In the DAS model, the conventional scheme for query over encrypted data in database is to construct efficient index in database. This can ensure query efficiency. However, the fuzzy search is often used in the query of character data. It will be very tough owing to data encryption. Even the tiny changes of plaintext, the ciphtext will be quite distinct. Therefore, it is crucial to construct efficient index of encrypted character strings. To address these problems, a cryptographic scheme of character data in relational database is proposed in this paper. In this scheme, the char or varchar data type and clob data type will be considered respectively. For the data of char or varchar type, an index based double filtration is established. The index includes two parts: the first part of index is used to determine the set of existed characters in original string, and the second part stores the characteristic value of the characters' positions. The first part of index implements the first filtration, which will filter all the records include inaccurate characters. The second part of index is used to verify the positions of character strings. It's the second filtration. For the data of clob type, instead of the original character data, the positions of all the character strings will be stored. This scheme avoids needless decryption and data transfer. Consequently, better query efficiency is achieved and fuzzy search is well supported.
人们越来越关注数据库即服务(DAS)体系结构。在DAS模型中,对数据库中加密数据进行查询的传统方案是在数据库中构造高效索引。这样可以保证查询效率。然而,在字符数据的查询中经常使用模糊搜索。由于数据加密,这将非常困难。即使明文的微小变化,密文也会相当明显。因此,构建高效的加密字符串索引是至关重要的。针对这些问题,本文提出了一种关系数据库中字符数据的加密方案。在这个方案中,将分别考虑char或varchar数据类型和clob数据类型。对于char或varchar类型的数据,建立了基于索引的双重过滤。索引包括两部分:索引的第一部分用于确定原字符串中存在的字符的集合,第二部分存储字符位置的特征值。index的第一部分实现了第一次过滤,它将过滤所有包含不准确字符的记录。index的第二部分用于验证字符串的位置。这是第二次过滤。对于clob类型的数据,将存储所有字符串的位置,而不是原始字符数据。该方案避免了不必要的解密和数据传输。从而提高查询效率,支持模糊搜索。
{"title":"Querying encrypted character data in DAS model","authors":"Nian Liu, Yajian Zhou, Xinxin Niu, Yixian Yang","doi":"10.1109/ICNDS.2010.5479313","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479313","url":null,"abstract":"There has been increasing concern about Databaseas-a-Service(DAS) architectures. In the DAS model, the conventional scheme for query over encrypted data in database is to construct efficient index in database. This can ensure query efficiency. However, the fuzzy search is often used in the query of character data. It will be very tough owing to data encryption. Even the tiny changes of plaintext, the ciphtext will be quite distinct. Therefore, it is crucial to construct efficient index of encrypted character strings. To address these problems, a cryptographic scheme of character data in relational database is proposed in this paper. In this scheme, the char or varchar data type and clob data type will be considered respectively. For the data of char or varchar type, an index based double filtration is established. The index includes two parts: the first part of index is used to determine the set of existed characters in original string, and the second part stores the characteristic value of the characters' positions. The first part of index implements the first filtration, which will filter all the records include inaccurate characters. The second part of index is used to verify the positions of character strings. It's the second filtration. For the data of clob type, instead of the original character data, the positions of all the character strings will be stored. This scheme avoids needless decryption and data transfer. Consequently, better query efficiency is achieved and fuzzy search is well supported.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study on e-marketing model based on resident community 基于居民社区的网络营销模式研究
Pub Date : 2010-06-07 DOI: 10.1109/ICNDS.2010.5479281
Li Zhao
The E-marketing model in China adopts the international generic model, which develops from WAN into the LAN. This model requires complete support systems, such as modern logistics distribution system, sound credit system and online settlement system. But these systems in China don't satisfy this demand. This paper addresses this problem and proposes a community-based E-marketing model. The model includes three development phases, i.e. establishing independent e-business community based on LAN, setting up e-business network based on MAN, establishing e-business network based on WAN. This model can solve the problems of current e-marketing and drive e-marketing development rapidly.
中国的网络营销模式采用国际通用模式,由广域网向局域网发展。这种模式需要完善的配套体系,如现代物流配送体系、健全的信用体系、网上结算体系等。但中国的这些系统并不能满足这一需求。本文针对这一问题,提出了基于社区的网络营销模式。该模式包括基于局域网建立独立的电子商务社区、基于城域网建立电子商务网络、基于广域网建立电子商务网络三个发展阶段。该模式能够解决当前网络营销存在的问题,推动网络营销的快速发展。
{"title":"Study on e-marketing model based on resident community","authors":"Li Zhao","doi":"10.1109/ICNDS.2010.5479281","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479281","url":null,"abstract":"The E-marketing model in China adopts the international generic model, which develops from WAN into the LAN. This model requires complete support systems, such as modern logistics distribution system, sound credit system and online settlement system. But these systems in China don't satisfy this demand. This paper addresses this problem and proposes a community-based E-marketing model. The model includes three development phases, i.e. establishing independent e-business community based on LAN, setting up e-business network based on MAN, establishing e-business network based on WAN. This model can solve the problems of current e-marketing and drive e-marketing development rapidly.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126307685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application research of trusted computing platform in electric power information system 可信计算平台在电力信息系统中的应用研究
Pub Date : 2010-06-07 DOI: 10.1109/ICNDS.2010.5479155
Ren-Jye Liu, D. Niu
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.
近年来,可信计算以主动防御的思想迅速发展,解决了计算机和网络系统的安全问题,可信计算被认为是最有可能从根本上解决计算机系统安全问题的方法。提出了一种可信计算平台在电力信息系统中的应用方案。根据电力信息系统的安全需求,设计了一种基于系统管理模式(SMM)的动态信任链构建方法,并对系统程序和关键应用进行了动态度量,以保证操作系统环境的完整性和可靠性,有效防御恶意代码,努力提升电力信息系统的安全防御能力。
{"title":"Application research of trusted computing platform in electric power information system","authors":"Ren-Jye Liu, D. Niu","doi":"10.1109/ICNDS.2010.5479155","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479155","url":null,"abstract":"In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Highway passenger traffic volume research based on gray - Markov prediction model 基于灰色马尔可夫预测模型的公路客运量研究
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479353
Li Zhang, Bo Liu
In this paper, we propose the application of gray Markov model for forecasting methods, and amend with the smooth ratio the historical data, establish the GM (1,1) model . By determining the coefficients to obtain the development series of the future road passenger traffic amount, and by combining the Markov chain process, to classify the random sequence status into three categories, by determining the status transfer matrix, we predict the road passenger traffic amount in 5 years. The theoretical analysis and practical application show that the prediction is more reliable using this method. We can manage the development of passenger traffic, which helps the administration to make decisions.
本文提出了应用灰色马尔可夫模型进行预测的方法,并用平滑比修正历史数据,建立GM(1,1)模型。通过确定系数得到未来道路客运量的发展序列,并结合马尔可夫链过程,将随机序列状态分为三类,通过确定状态传递矩阵,对未来5年的道路客运量进行预测。理论分析和实际应用表明,该方法具有较好的预测可靠性。我们可以管理客运量的发展,这有助于管理部门做出决策。
{"title":"Highway passenger traffic volume research based on gray - Markov prediction model","authors":"Li Zhang, Bo Liu","doi":"10.1109/ICNDS.2010.5479353","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479353","url":null,"abstract":"In this paper, we propose the application of gray Markov model for forecasting methods, and amend with the smooth ratio the historical data, establish the GM (1,1) model . By determining the coefficients to obtain the development series of the future road passenger traffic amount, and by combining the Markov chain process, to classify the random sequence status into three categories, by determining the status transfer matrix, we predict the road passenger traffic amount in 5 years. The theoretical analysis and practical application show that the prediction is more reliable using this method. We can manage the development of passenger traffic, which helps the administration to make decisions.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis for a CDMA network based on statistical algorithms 基于统计算法的CDMA网络性能分析
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479421
Cen Lu, Cuibo Yu, Xiaohua Zhang, Lihua Mu, Tingting Xu
Traditional performance analysis aiming at OMC performance data mainly focuses on two aspects: longitudinal comparison of the same network element in different time periods and horizontal comparison of the different network elements in the same time. It's lack of association analysis between performance indexes and in-depth data mining. In this paper, a network performance analysis approach based on correlation analysis and regression analysis is presented which focusing on solving the difficult problem that general diagnosis algorithms can hardly build for CDMA network optimization. Based on the characteristic of performance indexes, the statistical method was introduced to performance optimization. The correlation coefficients and degree of curve fitting were proposed to measure the related degree between performance indexes, which is the foundation of fault diagnosis for engineers. With the practical application to the network optimization, it's proved that the statistical analysis is a novel and efficient tool for performance optimization and fault diagnosis.
传统的针对OMC性能数据的性能分析主要集中在两个方面:同一网元在不同时间段的纵向比较和不同网元在同一时间的横向比较。缺乏绩效指标之间的关联分析和深入的数据挖掘。本文提出了一种基于相关分析和回归分析的网络性能分析方法,重点解决了一般诊断算法难以构建的CDMA网络优化难题。根据性能指标的特点,将统计方法引入到性能优化中。提出了相关系数和曲线拟合程度来衡量性能指标之间的关联度,这是工程师进行故障诊断的基础。通过在网络优化中的实际应用,证明了统计分析是一种新颖有效的性能优化和故障诊断工具。
{"title":"Performance analysis for a CDMA network based on statistical algorithms","authors":"Cen Lu, Cuibo Yu, Xiaohua Zhang, Lihua Mu, Tingting Xu","doi":"10.1109/ICNDS.2010.5479421","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479421","url":null,"abstract":"Traditional performance analysis aiming at OMC performance data mainly focuses on two aspects: longitudinal comparison of the same network element in different time periods and horizontal comparison of the different network elements in the same time. It's lack of association analysis between performance indexes and in-depth data mining. In this paper, a network performance analysis approach based on correlation analysis and regression analysis is presented which focusing on solving the difficult problem that general diagnosis algorithms can hardly build for CDMA network optimization. Based on the characteristic of performance indexes, the statistical method was introduced to performance optimization. The correlation coefficients and degree of curve fitting were proposed to measure the related degree between performance indexes, which is the foundation of fault diagnosis for engineers. With the practical application to the network optimization, it's proved that the statistical analysis is a novel and efficient tool for performance optimization and fault diagnosis.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Revised NMF with LDA based color face recognition 基于LDA的彩色人脸识别改进NMF
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479607
Xiaoming Bai, Chengzhang Wang
Color face is composed of information of different channels and provides more cues for recognition than grey scale one. A revised NMF with LDA based color face recognition approach is proposed in this paper. Block diagonal matrix is exploited to encode color information of different channels. And block diagonal constraint is imposed on NMF to factorize matrix. Class information of face samples is integrated into the approach through LDA on factorization coefficients. Experimental results on CVL and CMU PIE databases verify the effectiveness of the proposed approach.
彩色人脸由不同通道的信息组成,比灰度人脸提供了更多的识别线索。提出了一种改进的基于LDA的NMF彩色人脸识别方法。利用分块对角矩阵对不同信道的颜色信息进行编码。并对NMF施加对角块约束,对矩阵进行因式分解。通过对分解系数的LDA,将人脸样本的分类信息整合到该方法中。在CVL和CMU PIE数据库上的实验结果验证了该方法的有效性。
{"title":"Revised NMF with LDA based color face recognition","authors":"Xiaoming Bai, Chengzhang Wang","doi":"10.1109/ICNDS.2010.5479607","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479607","url":null,"abstract":"Color face is composed of information of different channels and provides more cues for recognition than grey scale one. A revised NMF with LDA based color face recognition approach is proposed in this paper. Block diagonal matrix is exploited to encode color information of different channels. And block diagonal constraint is imposed on NMF to factorize matrix. Class information of face samples is integrated into the approach through LDA on factorization coefficients. Experimental results on CVL and CMU PIE databases verify the effectiveness of the proposed approach.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fault self-diagnosis system of automatic transmission based on fuzzy BP network 基于模糊BP网络的自动变速器故障自诊断系统
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479333
Wang Xueyuan
According to the design procedure of fault self-diagnosis system and features of automatic transmission system, the list of relation and mapping between fault symptoms and fault causes are made in this paper. Applying the approach of fault self-diagnosis based on fuzzy neural network, fault diagnosis of the automatic transmission electronic control system is realized. The structure of fuzzy neural network and its corresponding learning method and pretreating strategy about the training samples are introduced in this paper. Using MATLAB as simulation platform, this fault diagnosis method is simulated with neural networks toolbox. The simulation results show that this fault diagnosis approach is effective and applied.
根据故障自诊断系统的设计流程和自动变速器系统的特点,给出了故障症状与故障原因之间的关系表和映射图。应用基于模糊神经网络的故障自诊断方法,实现了自动变速器电子控制系统的故障诊断。本文介绍了模糊神经网络的结构及其相应的学习方法和训练样本的预处理策略。以MATLAB为仿真平台,利用神经网络工具箱对该故障诊断方法进行了仿真。仿真结果表明了该方法的有效性和实用性。
{"title":"Fault self-diagnosis system of automatic transmission based on fuzzy BP network","authors":"Wang Xueyuan","doi":"10.1109/ICNDS.2010.5479333","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479333","url":null,"abstract":"According to the design procedure of fault self-diagnosis system and features of automatic transmission system, the list of relation and mapping between fault symptoms and fault causes are made in this paper. Applying the approach of fault self-diagnosis based on fuzzy neural network, fault diagnosis of the automatic transmission electronic control system is realized. The structure of fuzzy neural network and its corresponding learning method and pretreating strategy about the training samples are introduced in this paper. Using MATLAB as simulation platform, this fault diagnosis method is simulated with neural networks toolbox. The simulation results show that this fault diagnosis approach is effective and applied.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information asymmetries, financing and distorted investment 信息不对称、融资和扭曲投资
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479332
Bai Peiwen
Due to information asymmetries good firms or bad firms all finance and invest under some conditions, who prefer equity to debt financing when the NPV of a project is enough low, and prefer debt to equity financing when the NPV of the project is enough high. Financing produces the firms' overinvestment or underinvestment, the probability of which is affected by factors. In special, if the firms only issue debt, then they can avoid overinvestment or underinvestment. Firm assets-in-place and the true NPV of the project being transparent may avoid overinvestment or underinvestment. Furthermore consider dynamic stock financing, it is discovered there are many equilibria in stock financing and distorted investment which are related with different information asymmetries.
由于信息不对称,好企业和坏企业都会在一定条件下进行融资和投资,当项目的NPV足够低时,他们更倾向于股权融资而不是债务融资,当项目的NPV足够高时,他们更倾向于债务融资而不是股权融资。融资导致企业过度投资或投资不足,其发生的概率受因素影响。特别是,如果公司只发行债券,那么他们可以避免过度投资或投资不足。企业资产到位和项目的真实净现值透明可以避免过度投资或投资不足。进一步考虑动态股票融资,发现股票融资和扭曲投资存在许多均衡,这些均衡与不同的信息不对称有关。
{"title":"Information asymmetries, financing and distorted investment","authors":"Bai Peiwen","doi":"10.1109/ICNDS.2010.5479332","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479332","url":null,"abstract":"Due to information asymmetries good firms or bad firms all finance and invest under some conditions, who prefer equity to debt financing when the NPV of a project is enough low, and prefer debt to equity financing when the NPV of the project is enough high. Financing produces the firms' overinvestment or underinvestment, the probability of which is affected by factors. In special, if the firms only issue debt, then they can avoid overinvestment or underinvestment. Firm assets-in-place and the true NPV of the project being transparent may avoid overinvestment or underinvestment. Furthermore consider dynamic stock financing, it is discovered there are many equilibria in stock financing and distorted investment which are related with different information asymmetries.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking a proxy ring signature with revocable anonymity in MINE2009 在MINE2009中破坏具有可撤销匿名的代理环签名
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479266
Jianhong Zhang, Hua Chen
Proxy signature is an important delegation technique. Since it was introduced in 1996, many variants of proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection and the revocation of proxy signer's anonymous identity are needful in some practical applications. Recently, Wang et.al gave a new signature type: proxy ring signature with revocable anonymity. It allows that proxy signer anonymously produces a proxy signature. However, it is anonymous for the others except that the original signer can know exactly who is the actual proxy signer. Unfortunately, in this paper, by analyzing the scheme, we show that the scheme does not satisfy anonymity, that is to say, given an anonymous proxy signature, the others also can know the actual identity of proxy signer beside original signer. At the same time, it cannot also revoke anonymity of proxy signer's identity. Finally, we give the corresponding attacks on the scheme and the reasons to produce suck attacks.
代理签名是一种重要的委托技术。自1996年引入以来,已经提出了许多代理签名方案的变体。其中,代理签名者的隐私保护要求和代理签名者匿名身份的撤销在一些实际应用中是需要的。最近,Wang等人提出了一种新的签名类型:具有可撤销匿名性的代理环签名。它允许代理签名者匿名生成代理签名。但是,除了原始签名者可以确切地知道谁是实际的代理签名者之外,其他签名者是匿名的。不幸的是,本文通过对该方案的分析,证明了该方案不满足匿名性,即给定一个匿名代理签名,除了原始签名者之外,其他签名者也可以知道代理签名者的真实身份。同时,也不能撤销代理签名者身份的匿名性。最后给出了对该方案的相应攻击以及产生吸攻击的原因。
{"title":"Breaking a proxy ring signature with revocable anonymity in MINE2009","authors":"Jianhong Zhang, Hua Chen","doi":"10.1109/ICNDS.2010.5479266","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479266","url":null,"abstract":"Proxy signature is an important delegation technique. Since it was introduced in 1996, many variants of proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection and the revocation of proxy signer's anonymous identity are needful in some practical applications. Recently, Wang et.al gave a new signature type: proxy ring signature with revocable anonymity. It allows that proxy signer anonymously produces a proxy signature. However, it is anonymous for the others except that the original signer can know exactly who is the actual proxy signer. Unfortunately, in this paper, by analyzing the scheme, we show that the scheme does not satisfy anonymity, that is to say, given an anonymous proxy signature, the others also can know the actual identity of proxy signer beside original signer. At the same time, it cannot also revoke anonymity of proxy signer's identity. Finally, we give the corresponding attacks on the scheme and the reasons to produce suck attacks.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic data broadcasting dispatching technology based on hyper graph in unsymmetrical network 非对称网络中基于超图的动态数据广播调度技术
Pub Date : 2010-05-30 DOI: 10.1109/ICNDS.2010.5479387
Guo Peng, Hu Jun-da, Hu Hui
Data broadcasting is an important technology to improve the retractility of mobile computation system in unsymmetrical network. In the paper, a kind of multi-disk broadcasting dispatching technology is presented based on hyper graph, which can determine the amount of disks, the contribution of data items to each disks and their relative frequency by computer. The theoretical analysis and experiment results indicate that the method can greatly improve the average visiting time of data item .
数据广播是提高非对称网络中移动计算系统可扩展性的一项重要技术。本文提出了一种基于超图的多磁盘广播调度技术,该技术可以通过计算机确定磁盘的数量、每个磁盘对数据项的贡献以及它们的相对频率。理论分析和实验结果表明,该方法可以大大提高数据项的平均访问时间。
{"title":"Dynamic data broadcasting dispatching technology based on hyper graph in unsymmetrical network","authors":"Guo Peng, Hu Jun-da, Hu Hui","doi":"10.1109/ICNDS.2010.5479387","DOIUrl":"https://doi.org/10.1109/ICNDS.2010.5479387","url":null,"abstract":"Data broadcasting is an important technology to improve the retractility of mobile computation system in unsymmetrical network. In the paper, a kind of multi-disk broadcasting dispatching technology is presented based on hyper graph, which can determine the amount of disks, the contribution of data items to each disks and their relative frequency by computer. The theoretical analysis and experiment results indicate that the method can greatly improve the average visiting time of data item .","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122788555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 International Conference on Networking and Digital Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1