Please wait a minute...

Current Issue

    25 November 2011, Volume 32 Issue 11A
    Papers
    Multi-attribute dynamic spectrum access mechanism in cognitive radio networks
    Wen-jiang FENG,Dan-dan TANG,Yu-cai XIA
    2011, 32(11A):  1-8.  doi:1000-436X(2011)11A-0001-08
    Asbtract ( 0 )   HTML ( 1)   PDF (844KB) ( 5 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cognitive radio network possess the capability to sharply improve the efficiency of spectrum by allowing the cognitive radio user to access the idle channel licensed to the primary user.A multi-attribute dynamic spectrum access mechanism was proposed based on the spectrum's multi-attribute and the cognitive radio users' different traffic QoS demand.Markov model was employed to describe the channel status,and based on the QoS diversity of each CRU's traffic,SINR,channel capacity,the link delay and other parameters.AHP(analytic hierarchy process)algorithm was used to select the best access channel to satisfied different CRUs'traffic QoS demand.The time-stepping method was used to simulate the CRU's channel access process,and compared to the random channel access mechanism under different numbers of CRU,the simulation results showed that the proposed mechanism had less access collision,service discard and access failure,and could improve the reliability and efficiency of the communication.

    Semi-blind channel estimation method for MIMO NC-OFDM systems in cognitive radio context
    Ke-qin ZHOU,Rong-fang SONG,Xue-yun HE
    2011, 32(11A):  9-16.  doi:1000-436X(2011)11A-0009-08
    Asbtract ( 0 )   HTML ( 2)   PDF (766KB) ( 6 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new method of MIMO NC-OFDM semi-blind channel estimation in cognitive radio context based on linear prediction was proposed.First,the blind constrain of channel matrix obtained by linear prediction was imposed to the pilot assisted least square(LS)algorithm to get the time domain channel pulse response for MIMO NC-OFDM systems in cognitive radio context.Then,a noise reduction method in frequency domain was proposed to improve the channel estimation accuracy.Simulations show that this new semi-blind channel estimation method has good performance but with less pilots than conventional LS estimation and ordinary semi-blind channel estimation for MIMO NC-OFDM systems.Therefore,the spectral efficiency of the system can be improved.

    Optimization algorithm for cooperative detection model in cognitive radio
    Xin LIU,Xue-zhi TAN
    2011, 32(11A):  17-23.  doi:1000-436X(2011)11A-0017-07
    Asbtract ( 0 )   HTML ( 1)   PDF (726KB) ( 4 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of detection to primary user by cognitive radio could be improved through cooperative detection.In order to reduce the channel overhead and increase the efficiency of detection and transmission,a new multi-slot cooperative detection model was proposed.The optimizations of working period,sensing time and channel searching time were also analyzed in the proposed model.The optimization algorithms based on maximizing the transmission rate and transmission time proportion were respectively proposed to improve the transmission rate and transmission time of cognitive radio.Simulation result and theory analysis are consistent,and the result shows that the proposed algorithm can improve the detection probability,reduce detection overload and increase transmission efficiency,and both the interference to primary user and loss of spectrum access can be reduced simultaneously.

    Dynamical attestation for trust based on secure virtual machine introspection
    Guang-yuan SHI,Chang-xiang SHEN,Yi LIU
    2011, 32(11A):  24-38.  doi:1000-436X(2011)11A-0024-15
    Asbtract ( 0 )   HTML ( 1)   PDF (1006KB) ( 6 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing methods can't get the evidence timely,don’t protect attestator’s privacy enough,and have own security problems,to solve these problems,a dynamical attestation of trust based on secure virtual machine introspection was provided.First,using the deterministic push down automata(DPDA)to establish the expected behavior model of the program ,and then,in order to determine trustworthiness of the program,through the virtual machine introspection technique(VMI),the actual behavior was checked dynamically.In addition,using VMI to analysis the memory state of attestator,and reconstructing the key data structure,and verifying integrity of the system kernel files and the critical data.Finally,trustworthiness attestation system was designed and implemented.The experiments show that the system satisfies the requirements.

    Key management protocol for multi-level security UAV dynamic networking
    Ya-hui LI,Wen-sheng NIU,Ya-di ZHANG,Jian-feng MA,Yu-long SHEN
    2011, 32(11A):  39-44.  doi:1000-436X(2011)11A-0039-06
    Asbtract ( 89 )   HTML ( 5)   PDF (579KB) ( 353 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    UAV Dynamic networking needs the secure group communication.Based on the different security domain of battle environments,an efficient security solution for UAV dynamic networking was proposed,which consisted of a secure information exchange protocol for the data transmission between nodes in the wireless network and an broadcast encryption scheme for the secure session keys of a node,which supported the combination of the decryption process and the multi-level secure policies in AS and the different secure level member moving between the secure domains.The proposed protocol was a proved secure scheme by the formal theory analysis,and provided a secure,flexible and efficient method of key management for UAV dynamic networking.

    Cooperative spectrum sensing algorithm based on the maximum eigenvalue
    Jiao-jiao YANG,Shi-bing ZHANG,Hao-ye ZHANG
    2011, 32(11A):  45-50.  doi:1000-436X(2011)11A-0045-06
    Asbtract ( 73 )   HTML ( 2)   PDF (734KB) ( 59 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Accurate spectrum sensing is the key to achieve cognitive techniques.According to analyzing random matrix,the cooperative spectrum sensing algorithm was proposed,which is based on the maximum eigenvalue.By use of the correlation of signals received at the different nodes,the maximum eigenvalue of the signals covariance matrix is used to decide whether the primary signal is present,which reduces the sensing period and improves the performance of spectrum sensing.Simulation results show that the cooperative algorithm has about 5dB margin better than the MED algorithm in signal-to-noise ratio.

    Research on adaptive strategy for end-hopping system
    Chun-lei ZHAO,Chun-fu JIA,Chen WENG,Kai LIN
    2011, 32(11A):  51-57.  doi:1000-436X(2011)11A-0051-07
    Asbtract ( 83 )   HTML ( 5)   PDF (677KB) ( 234 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An adaptive strategy was proposed for EH system.Modules of attack detection,feedback transmission and adaptive control were added to original EH system.They could help to make threats analysis and adjust hopping strategy in real time,so as to reduce the probability of the system stepping into the attackers’target area.With the experiments proving the anti-attack ability of the prototype system,the feasibility and effectiveness of adaptive strategy were demonstrated for EH system.

    Novel channel allocation strategy for cognitive cooperative relay network
    Fu YUAN,Zi-bin WANG,Lin-hua ZHENG
    2011, 32(11A):  58-62.  doi:1000-436X(2011)11A-0058-05
    Asbtract ( 57 )   HTML ( 3)   PDF (660KB) ( 91 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel channel allocation strategy was proposed.The RC was allocated by comparing its throughput with throughput gains when it was allocated as DHC,and the first phase of channel allocation was confirmed.When a RC was treated as a DHC,it was further allocated by comparing the throughput gain as S-R link and R-D link,and the second phase of channel allocation was ascertained.Numerical results were given to verify the validity of this new strategy.Numerical results reveal that most RC are allocated as DTC and DHC by comparing their quantities after allocation.

    Trust based privacy protection method in LBS
    Feng GAO,Jing-sha HE,Feng ZHANG,Yu-qiang ZHANG
    2011, 32(11A):  63-70.  doi:1000-436X(2011)11A-0063-08
    Asbtract ( 55 )   HTML ( 1)   PDF (564KB) ( 77 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the multiple privacy protection demands in Locations Based Services (LBS),a user-centric trust based privacy protection model was proposed.In the model,user can set their privacy preference freely.The model uses a method base that integrates kinds of privacy protection methods to protect privacy.According to the trustworthy of network environment,the trustworthy of location,the trustworthy of surrounding users and the trustworthy of service providers,a method which meet diverse privacy protection requirements was chosen from the method base on the basis of the mapping relationship between trust and privacy protection method.Analysis and simulations results show the model can effectively protect privacy also with high quality of service.

    Construct of the attack resistance test and design of the penetration attack system based on penetration testing
    Ning ZHU,Xing-yuan CHEN,Yong-fu ZHANG
    2011, 32(11A):  71-78.  doi:1000-436X(2011)11A-0071-08
    Asbtract ( 97 )   HTML ( 6)   PDF (775KB) ( 155 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By analyzing the present condition of development &research for penetration testing,based on the basic theory of penetration testing,in order to fix the defect of penetration testing,defined and constructed attack resistance test(ART).It was a new method to analyze and measure the security and immunity of information system which used penetration testing as a kernel tool.Simultaneously,designed the penetration attack system detailedly which was the first step and important indemnification of ART,divided the function modules of the system,and realized the prototype system software,then checked and confirmed the correctness,effectively,and reasonableness of the system by building the test environment and carrying out function testing.

    Distributed cluster construction and maintenance algorithm for cognitive radio ad hoc networks
    Lei SONG,Wen-hua DOU,Li-ping RAO
    2011, 32(11A):  79-85.  doi:1000-436X(2011)11A-0079-07
    Asbtract ( 111 )   HTML ( 1)   PDF (544KB) ( 102 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The clustering algorithm of cognitive radio ad hoc networks (CRAHN) was researched.A special cluster structure was proposed,which fitted the characteristics of CRAHN.A distributed cluster construction and maintenance algorithm was designed based on minimal connected dominating set calculation algorithm.The algorithm only depends on local node information.Its approximation factor is 12 and it has O(nlgn) message complexity and O(n) time complexity.The algorithm has good load-balancing features and it is well to avoid the ripple effect.

    Intelligent mobile Agent based cognitive network QoS distributed monitoring and management model
    Cheng-jie GU,Shun-yi ZHANG,Yan-fei SUN
    2011, 32(11A):  86-94.  doi:1000-436X(2011)11A-0086-09
    Asbtract ( 54 )   HTML ( 1)   PDF (734KB) ( 79 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An intelligent mobile agent based cognitive network QoS distributed monitoring and management model was proposed.This model adopting the hierarchical architecture based on cognitive domain could complete the decomposition and dispatch of monitoring and management tasks through administrate agent in central layer and cognitive domain layer,generate the corresponding strategy through cognitive agent’s analysis and decision,and carry out the specific tasks using mobile agent in node monitoring and execution layer.Performance analysis and experimental results indicate that compared with SNMP based monitoring and management model and mobile agent based monitoring and management model,MACNDM model has the lighter run load and the faster response time,and can effectively locate QoS degradation.

    Cooperative spectrum sensing based on serial and parallel merging
    Cai-ping DONG,Wen-hui XIONG,Qiang LI,Shao-qian LI
    2011, 32(11A):  95-100.  doi:1000-436X(2011)11A-0095-06
    Asbtract ( 46 )   HTML ( 1)   PDF (733KB) ( 58 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the primary user detection probability,analyzed the hard combining spectrum sensing,soft combining spectrum sensing and the two-threshold spectrum sensing strategy.The cooperative spectrum sensing based on the serial and parallel model was proposed.The proposed strategy had the advantage of both hard and soft combining.Specifically,if the hard combining in the cognitive base station detected the presence of primary users,the cognitive users would avoid the using of the spectrum,otherwise,the cognitive users sent their energy information to the cognitive base station,for the base station detect whether the spectrum could be used via soft combination.Simulation results showed that the proposed algorithm could effectively improved the accuracy of the detection probability and decreased the bandwidth for reporting the cognitive user’s sensing results to the cognitive base station.

    Technical Reports
    Research on security mechanism of distributed object storage system under cloud computing environment
    Ying SHAN,Nian-min YAO
    2011, 32(11A):  101-108.  doi:1000-436X(2011)11A-0101-08
    Asbtract ( 64 )   HTML ( 2)   PDF (786KB) ( 98 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of cloud computing technology provide a global integrated solution for the current network technology.The security mechanism of distributed object storage system is proposed on the basis of the current study on the development of cloud computing technology environment.The security mechanism is based on the study of regional characteristics of the safety mechanism for distributed object storage the model of the nodes is established and system description of the working process is introduced,while combination of Euler detection and multidimensional scaling detection technology for safety monitoring of system nodes is adopted.The detailed description of functional structure for security mechanism is described.Experimental results show that the security mechanisms provided security scheme for implementing the resources integration and safety service which provides an effective safety program for distributed object storage system.

    Research of network security situation index system and visualization technology
    Xiao-yan LI,Qing-xian WANG,Lin YANG
    2011, 32(11A):  109-118.  doi:1000-436X(2011)11A-0109-10
    Asbtract ( 159 )   HTML ( 9)   PDF (827KB) ( 301 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network security situation indicator system and visualization technology was of great importance for network information security,how to visually show the overall security situation had important practical significance to network security management personnel.For the technical issues that the index of security situation was not accurate,calculating method was not practical,and visual effects was not straightforward.The security situation index system of offensive and defensive sides of the network was proposed and quantified the security index,designed and implemented based on geographic information systems,network topology graph,attack paths the security situation visualization prototype system.the security situation data showed in multiple views,multi-angle,multi-level display to the user by visualization technology,therefore the performance of the security situation will be more accurate and vivid,assessment of network security situation become timely and accurate,laying the foundation for rapid decision-making.

    Research on multilevel security model for information systems classified protection
    Chao-qin GAO,Chuang-bai XIAO,Yun-xiang GAO,Xiao XU
    2011, 32(11A):  119-124.  doi:1000-436X(2011)11A-0119-06
    Asbtract ( 45 )   HTML ( 1)   PDF (633KB) ( 156 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of protection and sharing of information in information system with multilevel security,the security requirements of information systems were analyzed,the BLP model of stand-alone computer systems was extended to information systems,the new interpretations of subjects and objects in information systems was introduced,the new need-to-share category was added to subjects and objects,and a multilevel security model for information sharing was developed.Then,the formal description of the security model was presented,the full set of access rules that apply to the system were established,and the security of the information system was proved.The new security model allows information being securely shared with the right users and protected from the wrong user,while maintaining the multilevel security of information system.

    Attack graph generation algorithm for large-scale network based on parallel
    Kai ZHAO,Yi ZHANG,Ben LAI,Xiao-xing LI
    2011, 32(11A):  125-131.  doi:1000-436X(2011)11A-0125-07
    Asbtract ( 57 )   HTML ( 1)   PDF (729KB) ( 133 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An attack graph generation algorithm based on parallel was presented.Firstly,the process of attack graph generation is divided into several sub-tasks,and the function of each sub-task is generating sub-attack graph between two subnets.Secondly,all the sub-tasks are handled parallel on multiple processors.Finally,form the final attack graph by integrating all the sub-attack graphs.The main ideas and work process of the algorithm were described.Theoretical analysis and experiment show that the algorithm has better scalability.

    Research on access control based on XACML in service oriented architecture
    Kai-yong XU,Guo-ming CAI,Ming YANG,Zhi-guo LV
    2011, 32(11A):  132-136.  doi:1000-436X(2011)11A-0132-05
    Asbtract ( 70 )   HTML ( 1)   PDF (495KB) ( 138 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    SOA posed the new security challenge to access control mechanism due to its dynamic nature,heterogeneity and loose-coupling.It extended service description model,added security constrain description in order that the expression could be rich and flexible to the demand for finding security service.Access control model based on XACML improve the access control security in SOA.And the method can realize the demand of service discovery for specific security attribute service.

    Improved proxy mobile IPv6 fast handoff scheme
    Cheng-zhe LAI,Hui LI,Yue-yu ZHANG,Jin CAO
    2011, 32(11A):  137-142.  doi:1000-436X(2011)11A-0137-06
    Asbtract ( 37 )   HTML ( 1)   PDF (709KB) ( 68 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved proxy mobile IPv6 fast handoff scheme based on the basic idea of PMIPv6 was proposed,which optimized the signaling process and could effectively reduce the handoff latency and packeted loss rate.Finally,a detailed comparative analysis of several schemes in terms of handoff delay was made.Results show that the scheme has good performance.

    Subcarrier power allocation scheme for OFDM based hybrid spectrum sharing systems
    Zhi LI,Jun WANG,Shao-qian LI
    2011, 32(11A):  143-151.  doi:1000-436X(2011)11A-0143-09
    Asbtract ( 35 )   HTML ( 1)   PDF (814KB) ( 76 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems,in which overlay and underlay spectrum sharing modes were both applied,a subcarrier power allocation scheme maximizing the transmission capacity of CR systems was proposed.In the proposed scheme,the power allocation was modeled as a convex optimization problem by taking both the total power budget of CR system and the interference constraint introduced to the primary user into account.Compared with the pure overlay and underlay schemes,both analytical and numerical results all showed that the OFDM based hybrid spectrum sharing CR system with the proposed power allocation could achieve capacity improvement.

    Method verifying the correctness of code refactoring program
    Ting LUO,Yuan-bo GUO,Yao-hui HAO,Hu LI
    2011, 32(11A):  152-157.  doi:1000-436X(2011)11A-0152-06
    Asbtract ( 59 )   HTML ( 3)   PDF (628KB) ( 265 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The program after code refactoring,probably because a number of coding errors were introduced in the process of reconstruction ,and could not properly achieve the function of original program,and therefore it was necessary to verify its correctness.But currently,it’s difficult to prove the correctness of program directly;the view of transforming the verification of program correctness into the verification of program equivalence,and proposed a theorem proving technology based on synthesis method to verify the equivalence.The technology could not only avoid the difficulties by directly verifying the correctness of the program,but also could make full use of existing theorem proving tools to improve the level of automation,reducing the difficulty of proof.the principle of the method was presented,the basic assumption and proving environment,and then sum up the key strategies for the formal specification.Finally the equivalence of RC4 algorithm was verified with the presented method,and the experimental results show the effectiveness of the method.

    Correspondences
    Single sign-on mechanism for distributed identity federation
    Hong-qi ZHANG,Chong-yan HAN
    2011, 32(11A):  158-162.  doi:1000-436X(2011)11A-0158-05
    Asbtract ( 63 )   HTML ( 1)   PDF (493KB) ( 79 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The complexity and bottleneck of Liberty Alliance were analyzed,which was the mainstream of federated identity management scheme.This paper improved the centralized identity federation and proposed a distributed identity federation,the single sign-on mechanism was also improved to make it useful in distributed identity federation.The distributed identity federation not only simplified the complexity and bottleneck of identity management,but also improved its security.

    Analysis and amendment of 3G authentication access mechanism
    Chao YANG,Jun-wei ZHANG,Jian-feng MA,Yong ZENG
    2011, 32(11A):  163-168.  doi:1000-436X(2011)11A-0163-06
    Asbtract ( 56 )   HTML ( 1)   PDF (741KB) ( 135 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The authentication and key agreement (AKA) protocol for the 3rd generation mobile communication was analyzed and proved by the BAN logic.It was shown that there was the security vulnerability and possible attack to the AKA protocol.Based on mutual authentication transfer and encryption of internal link,a new scheme was presented,which not only realized the procedure of the authentication between MS and VLR,but also enhanced the security of the links between HLR and VLR.Analyzed by BAN logic,the new scheme afforded provably security and necessary security attributes.

    Impact of spectrum sensing time on the performance of cognitive radio network
    Dong-bi ZHU,Dan-dan ZHU
    2011, 32(11A):  169-173.  doi:1000-436X(2011)11A-0169-05
    Asbtract ( 57 )   HTML ( 1)   PDF (653KB) ( 65 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The impact of secondary user's spectrum sensing time on the system performance in a single channel cognitive radio network was studied.the analytical model of the system Was presented and obtained the performance measures which could estimate the performance of the system such as the throughput and the interference ratio by probability analytic method.Numerical results show that secondary user's spectrum sensing time has a non-negligible impact on the performance of cognitive radio network.

    Cryptanalysis of the public-key cryptosystem based on TEME problem
    Hua-wei HUANG,Sheng-lin ZHU,Min ZHOU
    2011, 32(11A):  174-177.  doi:1000-436X(2011)11A-0174-04
    Asbtract ( 52 )   HTML ( 1)   PDF (630KB) ( 50 )   Knowledge map   
    References | Related Articles | Metrics

    The cryptosystem based on TEME problem over finite field is cryptanalysed.It is proved that solving computational TEME problem is equivalent to breaking PZZ cryptosystem and the decisional TEME problem is equivalent to the decision of the effectiveness of PZZ’s ciphertext.When A is an involutory matrix and Q 1 =A Q 2 A,the CTEME problem and DTEME problem are solvable in polynomial time.In this case,PZZ cryptosystem is not secure and it is easy to get plaintext by ciphertext and public key.Therefore,this case should be avoided when PZZ cryptosystem is used.

    Construction of dynamic linear feedback shift registers in RAKAPOSHI stream cipher
    Yang YANG,Guang ZENG
    2011, 32(11A):  178-183.  doi:1000-436X(2011)11A-0178-06
    Asbtract ( 65 )   HTML ( 1)   PDF (656KB) ( 97 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Dynamic linear feedback shift register (DLFSR)was a popular way to irregular clocking the linear feedback shift registers,which had a better tradeoff between the security and efficiency.Through analysis of the DLFSR in stream cipher RAKAPOSHI,a RAKAPOSHI-like DLFSE model was presented,and the sufficient and necessary condition was analyzedfor its output sequence being periodic.Furthermore,the relationship of the period between controlled sequence and output one was explicie,and finally the condition for the output sequence to be the maximal sequence was obtained.Based on these results,a naive search algorithm was given for finding maximal period RAKAPOSHI-like DLFSE.

    One-way accumulator-based key management protocol for wireless sensor networks
    Chun-guang MA,Jiu-ru WANG,Xiao-rui ZHONG,Hua ZHANG
    2011, 32(11A):  184-189.  doi:1000-436X(2011)11A-0184-06
    Asbtract ( 68 )   HTML ( 4)   PDF (575KB) ( 112 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to integrate identity authentication and key agreement,the key management problem of wireless sensor network(WSN)is analyzed from the standpoint of set theory,and a one-way accumulator-based key management protocol is put forward for WSN.The experiments and analysis showed that the proposed protocol not only implements identity authentication function,but has high connectivity,constant storage demand and ease of scalability features as well.

    Attribute-based encryption with constant size ciphertexts
    Shao-zhen CHEN,Hai-bin WANG
    2011, 32(11A):  190-195.  doi:1000-436X(2011)11A-0190-06
    Asbtract ( 51 )   HTML ( 1)   PDF (533KB) ( 47 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Using dual system encryption,a attribute-based encryption scheme with constant size ciphertext was proposed in prime order bilinear group.The scheme relied on the D-Linear and decision bilinear Diffie-Hellman assumptions,and was proven fully secure under standard model.Moreover,this scheme can satisfy higher efficiency of transmission and computation because it achieves constant size ciphertexts and constant length of pairing computations.

    Novel composable oblivious transfer protocol against adaptive adversary
    Bin ZHANG,Qiu-liang XU,Han JIANG
    2011, 32(11A):  196-203.  doi:1000-436X(2011)11A-0196-08
    Asbtract ( 70 )   HTML ( 1)   PDF (645KB) ( 86 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Oblivious transfer (OT) protocol was the fundamental protocol of secure multi-party computation,and constructing composable efficent protocol which could resist adaptive adversary was a difficult open problem in the research of OT protocol in the recent years.This schene alter the dual-mode encryption scheme to multi-branch encryption,and based on the new scheme the article realized a novel OTkn protocol under the UC secure model with CRS trusted assumption.The new protocol improve the efficiency of the protocol comparing to the existing UC secure protocol that can resist adaptive adversary.

    Recursive constructions and counting of orthomorphic permutations
    Feng-rong ZHANG,Yu-pu HU,Hua MA,Min XIE,Jun-tao GAO
    2011, 32(11A):  204-208.  doi:1000-436X(2011)11A-0204-05
    Asbtract ( 44 )   HTML ( 1)   PDF (628KB) ( 232 )   Knowledge map   
    References | Related Articles | Metrics

    The properties and known constructions of orthomorphic permutations were investigated.On this basis,a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is presented.Furthermore,the new constructed orthomorphic permutations are different from the known ones.In addition,the constructed orthomorphic permutations are pair-wise different.Finally,combining the known orthomorphic permutations and a special class of orthomorphic permutations,the number of the new constructed orthomorphic permutations is proposed.

    Steganalysis of quantization index modulation steganography based on the nonuniform DCT
    Hai-ying GAO
    2011, 32(11A):  209-212.  doi:1000-436X(2011)11A-0209-04
    Asbtract ( 38 )   HTML ( 1)   PDF (520KB) ( 73 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An efficient steganalysis algorithm was proposed for NDCT-QIM steganography which takes the statistical moments in the frequency domain of the histogram of wavelet subbands and standard difference of the histogram and difference histogram of the DCT efficient as features.The detection rate of our algorithm is up to 82% when the embedding rate is 80%.An advanced steganographic algorithm was proposed to improve the security of NDCT-QIM.

    On the stable k-error linear complexity of periodic sequences
    Jian-qin ZHOU,Xiao-ping DAI,Xiao-jun WANG
    2011, 32(11A):  213-220.  doi:1000-436X(2011)11A-0213-08
    Asbtract ( 40 )   HTML ( 0)   PDF (609KB) ( 783 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The concept of stable k-error linear complexity was presented to study sequences with high k-error linear complexity.By studying linear complexity of binary sequences with period 2n,the method using cube theory to construct sequences with maximum stable k-error linear complexity was presented,and many examples were given to illustrate the approach.It was proved that a binary sequence with period 2n could be decomposed into some disjoint cubes.The cube theory is a new direction for studying k-error linear complexity.Finally,It was proved that the maximum k-error linear complexity is 2n-(2l-1)over all 2nperiodic binary sequence,where 2l-1≤k<2l.

    Adaptive pulse waveforms design based on cognitive radio for UWB system
    Zhan-biao JIA,Hong CHEN
    2011, 32(11A):  221-226.  doi:1000-436X(2011)11A-0221-06
    Asbtract ( 51 )   HTML ( 0)   PDF (705KB) ( 85 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A dynamical construction of emission mask and the design of adaptive pulse waveforms of cognitive ultra wideband (CUWB) wireless communication system were researched.The construction scheme of dynamical emission mask,which adapted to spectrum environment and was compatible with static emission mask,was proposed to overcome the lack of interaction with radio frequency environment which the static emission mask had.According to the various dynamical emission masks which were constructed based on real-time spectrum detection,the adaptive pulse waveform based on the combined sinusoid Gaussian was designed.The simulation results show that the adaptive pulse waveform can adjust the parameters dynamically according to the change of the spectral mask,which not only can suppress the narrowband interferences automatically and achieve dynamic avoidance of authorized users,but also has higher spectral utilization efficiency.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: