The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hadoop is a Apache project, which has be used at many fields, such online media companies including Facebook, Yahoo, educational service, government. However, there are some security risks or untrust risks in the Hadoop cluster. In the paper, a Trusted Scheme for Hadoop cluster (TSHC) to protect data security with Trusted Computing and cryptography technology is proposed. We first propose the trusted...
Wireless Sensor Networks (WSNs) consists of a large number of low-power, limited-processing and limited-storage sensors, which is applied for all kinds of areas. In the paper, we introduce an energy efficiency trusted dynamic routing protocol for wireless sensor network (EETDRP), which is designed based on Destination Sequenced Distance Vector Protocol and trusted management. And the wireless sensor...
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all...
Cyclic codes with two zeros and their dual codes as a practically and theoretically interesting class of linear codes have been studied for many years and find many applications. The determination of the weight distributions of such codes is an open problem. Generally, the weight distributions of cyclic codes are difficult to determine. Utilizing a class of elliptic curves, this paper determines the...
In this paper, based on Σ-protocol on HC (a NP-complete language), we firstly construct a Σ-protocol for any NP language thm1 ∧ thm2, then transfer it into a non-interactive protocol from a hash function and a pseudo-random generator. Finally, we construct an efficient round-optimal secure two-party computation protocol from our non-interactive protocols.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.