The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are often deployed in hostile and unattended environments. Then two important problems for key management are presented. First, how to establish the encryption keys among sensor nodes to ensure the security of the network applications. Second, how to avoid the key being obtained especially the sensor be captured. In this paper, we proposed a novel key management method based...
The concrete tripartite concurrent signature scheme designed by Susilo et al. is found being unambiguity. In other words, any fourth party can identify who is the real signer of the publicly available valid signatures before the keystone is released. In order to overcome this flaw, we proposed an improved concrete tripartite concurrent signature (iCTCS) scheme based on the ring signature. Every user...
Key management is one of the most important issues of any secure communication. With the increasing demand for the transmission security in wireless sensor networks (WSNs), it is urgent to introduce the secure and reliable key management scheme into the WSNs. In this paper, we proposed a hierarchical key management scheme to ensure the security of the network services and applications in WSNs. Comparing...
In this paper, we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic network. The dual line graph of a directed cyclic graph is considered as a system. By regarding the global encoding kernels in the original graph as the corresponding inputs or outputs of some subsystem and the local encoding kernels in original graph as gains of...
The increasing scale and complexity of software systems have led to a large amount of work being performed in the area of software architecture of object-oriented systems. For the purpose of reasonable description of software structure, we make use of complex network theory to characterize and describe their macroscopic properties. We propose a directed software coupling network, and then empirical...
Most verifiable multi-secret sharing schemes can not distinguish the security classification because of having the common drawback of sharing secrets with the same threshold value. In order to withstand the problem, a novel verifiable dynamic multi-policy secret sharing scheme is proposed, in which the dealer can freely give any sets of group secrets for sharing according to the different threshold...
Path-sensitive analysis is an important feature of static program analysis that can assist to performance the software testing and ensure the software quality. Currently most analysis models are based on symbolic execution analysis. Our approach faces on some challenges like how to deal with the "path explosion" problem due to the number of paths growing exponentially with the number of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.