【摘 要】
:
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic m
【机 构】
:
School of Computer, Beijing Information Science and Technology University,Beijing Key Laboratory of
【出 处】
:
Wuhan University Journal of Natural Sciences
论文部分内容阅读
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to detect and locate the malicious nodes. We also prove the security property of the scheme theoretically. Its effectiveness is demonstrated, and overhead is analyzed through extensive experiments.
Network paper can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to detect and locate the malicious nodes. We also prove the security property of the scheme theoretically. Its effectiveness is demonstrated, and overhead is analyzed through extensive experiments.
其他文献
傅抱石先生(一九○四—一九六五)是我国现代著名的山水画家、美术教育家、美术史家、篆刻艺术家。他在美术方面有着多方面的才华,在中国画、篆刻、美术理论方面都做出了卓越
In this paper, we focus on the fuzzy keyword search problem over the encrypted cloud data in the cloud computing and propose a novel Two-Step-Bloom-Secure-F
In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, ex pansion, and permuted choices.They
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationall
In this paper, the cyclic code of the classic circuit is transformed and transplanted; then, the quantum encoding scheme based on cyclic code and quantum er
一.目的:
目前肾移植术已较为成熟,在经历了手术技术、宿主对异体器官排斥反应的困难之后,术后感染已成为器官移植病人的重要并发症和死亡原因,其中肺部感染最为常见。鉴于
本试验用新型栽培种(A)、普通栽培种(T)和能产生2n花粉(FDR)的二倍体杂种(D)以不完全双列杂交设计配制杂种并产生5个杂种群体(TA、TD、AD、AA及TT).这些群体的无性系按完全随
The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend.In this paper, we design a mobile botnet, which