Please wait a minute...

����Ŀ¼

    15 May 2016, Volume 2 Issue 5
    Comprehensive Review
    Survey on UASN topology control
    Hong-ri LIU,Yun-xiao SUN,Jia SONG,Yang LIU,Jun-heng HUANG,Bai-ling WANG
    2016, 2(5):  1-10.  doi:10.11959/j.issn.2096-109x.2016.00053
    Asbtract ( 144 )   HTML ( 10)   PDF (1086KB) ( 187 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the status of current research of water acoustic sensor network nodes and communication structure were summed up,and the impact of the time synchronization,MAC protocol and deployment strategies on network topology control were analyzed.Secondly,following successive process of network deployment,three scientific issues including the deployment generation of topological structure,the dynamic evolution of topology and healing mechanism of topology were extracted.Finally,a new thought for future research was provided.

    Papers
    Linear transformation shift register sequences
    Ming-sheng WANG,Zai-liang TANG
    2016, 2(5):  11-15.  doi:10.11959/j.issn.2096-109x.2016.00051
    Asbtract ( 152 )   HTML ( 4)   PDF (1387KB) ( 90 )   Knowledge map   
    References | Related Articles | Metrics

    Linear transformation shift registers (TSR) were introduced by Tsaban and Vishne,which was a word-oriented shift register output a word per step.Some basic properties of sequences generated by the TSR were presented,and a new criterion for deciding if the characteristic polynomial of a TSR system is irreducible was given.This criterion avoids operations in extension fields.

    Research and implement of file safe deposit box based on authentication and authorization
    Xiao-ning DONG,Xiao-ping WU,Hong-cheng LI
    2016, 2(5):  16-20.  doi:10.11959/j.issn.2096-109x.2016.00054
    Asbtract ( 139 )   HTML ( 2)   PDF (1203KB) ( 240 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering that the existing file safe deposit boxes lack online authentication and server authorization,a file safe deposit box based on authentication and authorization was designed and achieved.This system firstly identified the users of the file box online,thus avoiding the illegal users to login.Moreover,the master collected the operation events exerted on the files in the clients,and the master provided a granular authentication for the operation of users,thus avoiding the illegal operation and incorrect operation.The test of this system proved that it can be able to achieve the preset functions and can be widely used in many conditions.

    Time series and semantics-based chinese microblog topic detection and tracking method
    Tie-ming CHEN,Xiao-hao WANG,Wei-wei PANG,Jie JIANG
    2016, 2(5):  21-29.  doi:10.11959/j.issn.2096-109x.2016.00048
    Asbtract ( 137 )   HTML ( 4)   PDF (1424KB) ( 70 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a widely used tool in social networks,microblog is definitely with short document,quick broadcasting and topic changeable,which results in big challenging for social topic detection and tracking.A new systematic framework for micro-blog topic detection and tracking was proposed based on the microblog clustering using temporal trend and semantic similarity.Firstly,a feature words selection method for hot topics was presented by defining the temporal frequent words set.Secondly,an initially clustering was conducted depending on the selected temporal frequent words set.As far as the overlaps between initial clusters concerned,an effective overlap elimination algorithm was proposed,by introducing the extended short document semantic membership,to separate any possible overlapped initial clusters.Finally,an aggregated topic clustering method was employed using the cluster semantic similarity matrix.The experiments were at last done on some real-world dataset from Sina microblog.It show that the method for chinese microblog topic detection and tracking can obtain excellent performance and results.

    Micro-blog topic detection algorithm based on topic model
    Hua-jun HUANG,Jun-shan TAN,Jiao-hua QIN
    2016, 2(5):  30-38.  doi:10.11959/j.issn.2096-109x.2016.00049
    Asbtract ( 170 )   HTML ( 7)   PDF (1330KB) ( 77 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Micro-blog data has the characteristic of real-time,volume,short-text,and noise-rich.So it is a challenge for the traditional topic detection technology.A novel micro-blog topic detection algorithm based on topic model was proposed.Firstly,the micro-blog data was expressed as text word matrix and word relation matrix.The topic word was extracted from the two vectors.Secondly,the topic model was obtained with clustering.Finally,the topic detection of micro-blog was obtained by clustering text and topic model.Experimental results show that the algorithm proposed can effectively detection the text topic,and with the best parameter group of precision,recall rate,F,and the value F is about 95%.

    Outsourced attribute-based encryption with policy update
    Su-qing LIN
    2016, 2(5):  39-49.  doi:10.11959/j.issn.2096-109x.2016.00055
    Asbtract ( 144 )   HTML ( 9)   PDF (2574KB) ( 103 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the efficient and flexible access control for the encrypted data stored in the cloud,an outsourced attribute-based encryption scheme with policy update was proposed.Based on the standard attribute-based encryption scheme,the functionality of policy update from delegation for a ciphertext without revealing any confidential information of the plaintext and private keys by utilizing the techniques of key blinding and outsourcing decryption was accomplished.Simultaneously,the decryption overhead for a user to recover the plaintext was effectively reduced.The scheme supports non-monotonic access structure and can be proved to have selective IND-CPA security and private key security under standard assumptions,respectively,in the standard model.Compared with similar schemes from literatures,the scheme provides better security and efficiency.

    Novel watermarking based on DIBR 3D image
    Chen CUI,Shen WANG,Qiong LI
    2016, 2(5):  50-55.  doi:10.11959/j.issn.2096-109x.2016.00052
    Asbtract ( 176 )   HTML ( 6)   PDF (2160KB) ( 66 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Depth-image-based rendering (DIBR) has become an important technology in 3D displaying with its great advantages.As a result,more and more 3D products copyright problems turn out.Since either the center view with depth image or the synthesized virtual views could be illegally distributed,not only the center views but also the synthesized virtual views need to be protected.A watermarking method for DIBR 3D images was proposed.After applying three-level DWT to the center image,odd-even quantization was utilized to modify the coefficients of the sub-blocks of the center image,by this way the proposed method was made robust to typical signal distortions,such as JPEG compression,noise addition and median filter.As the experimental results shown,the proposed method is much more robust to the common signal distortion attacks with lower BER (bit error rate) compared with existing methods.

    Automatic search algorithm for differential characteristics in ARX ciphers
    Zheng-bin LIU
    2016, 2(5):  56-63.  doi:10.11959/j.issn.2096-109x.2016.00050
    Asbtract ( 214 )   HTML ( 15)   PDF (644KB) ( 128 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How to compute the differential of modular addition efficiently is critical to automatic search for differential characteristic in ARX ciphers.To solve this problem,firstly,the concept of collerated difference distribution table (CDDT) was proposed.By looking up the CDDT,it was very efficient to compute the differential probability of modular addition.Secondly,extending Matsui’s algorithm to ARX cihpers and using CDDT,an automatic search algorithm was proposed,and the algorithm could give the differential characteristic with highest probability in ARX ciphers.Finally,the proposed algorithm was applied to the ARX cipher SPECK,and got the best differential characteristics for SPECK32,SPECK48 and SPECK64.

    PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
    Shi-zhuo DENG,Ji-tao YAO,Bo-tao WANG,Yue-mei CHEN,Ye YUAN,Yan-hui LI,Guo-ren WANG
    2016, 2(5):  64-76.  doi:10.11959/j.issn.2096-109x.2016.00057
    Asbtract ( 193 )   HTML ( 3)   PDF (2601KB) ( 89 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.

    Multi-parties key agreement protocol based on elliptic curve
    Long GAO,Chun-ming TANG,Yong-qiang ZHANG
    2016, 2(5):  77-80.  doi:10.11959/j.issn.2096-109x.2016.00056
    Asbtract ( 235 )   HTML ( 14)   PDF (581KB) ( 830 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: