期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
1
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 Pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
Adaptive Application Offloading Decision and Transmission Scheduling for Mobile Cloud Computing 被引量:6
2
作者 Junyi Wang Jie Peng +2 位作者 Yanheng Wei Didi Liu Jielin Fu 《China Communications》 SCIE CSCD 2017年第3期169-181,共13页
Offloading application to cloud can augment mobile devices' computation capabilities for the emerging resource-hungry mobile application, however it can also consume both much time and energy for mobile device off... Offloading application to cloud can augment mobile devices' computation capabilities for the emerging resource-hungry mobile application, however it can also consume both much time and energy for mobile device offloading application remotely to cloud. In this paper, we develop a newly adaptive application offloading decision-transmission scheduling scheme which can solve above problem efficiently. Specifically, we first propose an adaptive application offloading model which allows multiple target clouds coexisting. Second, based on Lyapunov optimization theory, a low complexity adaptive offloading decision-transmission scheduling scheme has been proposed. And the performance analysis is also given. Finally, simulation results show that,compared with that all applications are executed locally, mobile device can save 68.557% average execution time and 67.095% average energy consumption under situations. 展开更多
关键词 mobile cloud computing application offloading decision transmission scheduling scheme Lyapunov optimization
下载PDF
指定验证方的门限验证签名方案及安全性证明 被引量:8
3
作者 陈伟东 冯登国 谭作文 《软件学报》 EI CSCD 北大核心 2005年第11期1967-1974,共8页
Laih提出了指定验证方的签名方案设计问题,并给出一种解决方案.首先分析指出该方案存在严重安全缺陷,然后提出了签名方案SV-EDL,解决了如上密码学问题.同时,把可证明安全理论引入这类方案的分析设计,并在RO(randomoracle)模型中证明:SV-... Laih提出了指定验证方的签名方案设计问题,并给出一种解决方案.首先分析指出该方案存在严重安全缺陷,然后提出了签名方案SV-EDL,解决了如上密码学问题.同时,把可证明安全理论引入这类方案的分析设计,并在RO(randomoracle)模型中证明:SV-EDL的抗伪造安全性和计算Diffie-Hellman(computational Diffie-Hellman,简称CDH)问题紧密关联,亦即伪造SV-EDL签名几乎和解决CDH问题一样困难;除指定方以外,任何人验证签名的能力都与决策Diffie-Hellman(decisional Diffie-Hellman,简称DDH)问题密切相关.由于CDH问题和DDH问题的困难性与离散对数(discretelogarithm,简称DL)问题紧密相关已成为广泛共识,因此与当前同类方案比较,该签名方案提供了更好的安全性保证.此外,上述签名方案还以非常简明、直接的方式满足不可否认要求.最后提出并构造了验证服务器系统的门限验证协议,并在标准模型中给出了安全性证明.该方案不要求可信中心的存在. 展开更多
关键词 数字签名方案 可证明安全性 计算Diffie-Hellman(CDH)假设 决策Diffie—Hellman(DDH)假设 随机预言模型
下载PDF
ElGamal加密方案的KDM安全性 被引量:1
4
作者 常金勇 薛锐 史涛 《密码学报》 2014年第3期235-243,共9页
一个公钥加密方案的KDM(Key-Dependent Message)安全性要求:即使敌手可以得到一些可能依赖于私钥的消息加密后的密文,它仍然是安全的.这一场景经常会出现在如:硬盘加密、形式化密码学或者一些特殊的协议中.迄今为止,已经有一些具体的方... 一个公钥加密方案的KDM(Key-Dependent Message)安全性要求:即使敌手可以得到一些可能依赖于私钥的消息加密后的密文,它仍然是安全的.这一场景经常会出现在如:硬盘加密、形式化密码学或者一些特殊的协议中.迄今为止,已经有一些具体的方法可以达到这类安全性.但是,大多数情形中,都限制消息作为用户私钥的函数为仿射函数.本文定义了一类新的函数族,并且证明了在公钥密码学中起着非常重要作用的ElGamal加密方案关于这类函数族具有相应的KDM安全性.从技术角度来说,由于ElGamal加密方案的明文空间与私钥空间不太"匹配",因此,我们需要将原始的ElGamal加密方案进行适当的"裁剪"以证明它的KDM安全性.更为重要的是,本文定义的新的函数族自然地包含一些不属于仿射函数族的函数.另外,也证明了该方案关于Qin等人在2013年ACISP上提出的函数族也满足相应的KDM安全性.最后,我们指出,在这两种情形下,都可以将本文所得到的"裁剪的"ElGamal加密方案应用到匿名证书系统中. 展开更多
关键词 KDM安全性 ElGamal方案 选择明文攻击 判定性Diffie-Hellman假设
下载PDF
State of Art:Vertical Handover Decision Schemes in Next-Generation Wireless Network 被引量:1
5
作者 E.M.Malathy Vijayalakshmi Muthuswamy 《Journal of Communications and Information Networks》 2018年第1期43-52,共10页
The state of art pertaining to vertical handover decisions in next-generation wireless networks provides a detailed overview of vertical handover studies.This paper classifies the research initiatives under the vertic... The state of art pertaining to vertical handover decisions in next-generation wireless networks provides a detailed overview of vertical handover studies.This paper classifies the research initiatives under the vertical handover decision mechanism for heterogeneous wireless networks.A fair comparison of traditional and recent techniques is drafted to obtain direction of the vertical handover decision.Several issues related to seamless support on mobility management techniques have been described in the literature.The next-generation wireless network promises to offer enhanced data services compared to other networks in mobile communication.Since all next generation network(NGN)is an IP-based network,challenges drive toward providing quality of service in the handover process.The necessity of handover process is a seamless connection.The handover operations that minimize or even target the elimination of delay in new network connection establishment are most welcomed.However,frequent disconnection and inefficient seamless handovers result in handover operation failures.Most of the existing methods on handover decisions are based on mobile-controlled handovers.Here,the decisions are in-corporate in the mobile devices.Several mobile-controlled handovers take a single parameter or two or more additional parameters as a combination to evaluate the policy decision.These approaches are carefully studied and classified. 展开更多
关键词 state of art vertical handover heterogeneous wireless network decision schemes classification
原文传递
Synergetic Optimization of Missile Shapes for Aerodynamic and Radar Cross-Section Performance Based on Multi-objective Evolutionary Algorithm
6
作者 刘洪 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期36-40,共5页
A multiple-objective evolutionary algorithm (MOEA) with a new Decision Making (DM) scheme for MOD of conceptual missile shapes was presented, which is contrived to determine suitable tradeoffs from Pareto optimal set ... A multiple-objective evolutionary algorithm (MOEA) with a new Decision Making (DM) scheme for MOD of conceptual missile shapes was presented, which is contrived to determine suitable tradeoffs from Pareto optimal set using interactive preference articulation. There are two objective functions, to maximize ratio of lift to drag and to minimize radar cross-section (RCS) value. 3D computational electromagnetic solver was used to evaluate RCS, electromagnetic performance. 3D Navier-Stokes flow solver was adopted to evaluate aerodynamic performance. A flight mechanics solver was used to analyze the stability of the missile. Based on the MOEA, a synergetic optimization of missile shapes for aerodynamic and radar cross-section performance is completed. The results show that the proposed approach can be used in more complex optimization case of flight vehicles. 展开更多
关键词 multi-objective design(MOD) multidisciplinary design optimization (MDO) evolutionary algorithm synergetic optimization decision making scheme interactive preference articulation Pareto optimal set
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部