期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
Decision Tree Based Key Management for Secure Group Communication 被引量:2
1
作者 P.Parthasarathi S.Shankar 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期561-575,共15页
Group communication is widely used by most of the emerging network applications like telecommunication,video conferencing,simulation applications,distributed and other interactive systems.Secured group communication p... Group communication is widely used by most of the emerging network applications like telecommunication,video conferencing,simulation applications,distributed and other interactive systems.Secured group communication plays a vital role in case of providing the integrity,authenticity,confidentiality,and availability of the message delivered among the group members with respect to communicate securely between the inter group or else within the group.In secure group communications,the time cost associated with the key updating in the proceedings of the member join and departure is an important aspect of the quality of service,particularly in the large groups with highly active membership.Hence,the paper is aimed to achieve better cost and time efficiency through an improved DC multicast routing protocol which is used to expose the path between the nodes participating in the group communication.During this process,each node constructs an adaptive Ptolemy decision tree for the purpose of generating the contributory key.Each of the node is comprised of three keys which will be exchanged between the nodes for considering the group key for the purpose of secure and cost-efficient group communication.The rekeying process is performed when a member leaves or adds into the group.The performance metrics of novel approach is measured depending on the important factors such as computational and communicational cost,rekeying process and formation of the group.It is concluded from the study that the technique has reduced the computational and communicational cost of the secure group communication when compared to the other existing methods. 展开更多
关键词 Key generation adaptive Ptolemy decision tree cost reduction secure group communication
在线阅读 下载PDF
A Secure Session Key Distribution Scheme for Group Communications
2
作者 林仁宏 詹进科 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期192-196,共5页
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join... In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless). 展开更多
关键词 key management symmetric encryption group communication pseudo-random function
在线阅读 下载PDF
Overlay Share Mesh for Interactive Group Communication with High Dynamic
3
作者 吴言华 蔡云泽 许晓鸣 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第1期1-8,共8页
An overlay share mesh infrastructure is presented for high dynamic group communication systems, such as distributed interactive simulation (DIS) and distributed virtual environments (DVE). Overlay share mesh infrastru... An overlay share mesh infrastructure is presented for high dynamic group communication systems, such as distributed interactive simulation (DIS) and distributed virtual environments (DVE). Overlay share mesh infrastructure can own better adapting ability for high dynamic group than tradition multi-tree multicast infrastructure by sharing links among different groups. The mechanism of overlay share mesh based on area of interest (AOI) was discussed in detail in this paper. A large number of simulation experiments were done and the performance of mesh infrastructure was studied. Experiments results proved that overlay mesh infrastructure owns better adaptability than traditional multi-tree infrastructure for high dynamic group communication systems. 展开更多
关键词 area of interestc (AOI) overlay architecture group communication share mesh
在线阅读 下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
4
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 Multicast security group communication group key management Access control Secret key tree
在线阅读 下载PDF
Integrating IPsec within OpenFlow Architecture for Secure Group Communication
5
作者 Vahid Heydari Fami Tafreshi Ebrahim Ghazisaeedi +1 位作者 Haitham Cruickshank Zhili Sun 《ZTE Communications》 2014年第2期41-49,共9页
Network security protocols such as IPsec have been used for many years to ensure robust end-to-end communication and are important in the context of SDN. Despite the widespread installation of IPsec to date, per-packe... Network security protocols such as IPsec have been used for many years to ensure robust end-to-end communication and are important in the context of SDN. Despite the widespread installation of IPsec to date, per-packet protection offered by the protocol is not very compatible with OpenFlow and tlow-like behavior. OpenFlow architecture cannot aggregate IPsee-ESP flows in transport mode or tunnel mode because layer-3 information is encrypted and therefore unreadable. In this paper, we propose using the Security Parameter Index (SPI) of IPsec within the OpenFlow architecture to identify and direct IPsec flows. This enables IPsec to conform to the packet-based behavior of OpenFlow architecture. In addition, by distinguishing between IPsec flows, the architecture is particularly suited to secure group communication. 展开更多
关键词 IPSEC OpenFlow secure group communication group domain of interpretation (GDOI) flow-based switching
在线阅读 下载PDF
Fault Tolerance and Recovery for Group Communication Services in Distributed Networks 被引量:1
6
作者 王跃华 周忠 +1 位作者 Ling Liu 吴威 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第2期298-312,共15页
Group communication services (GCSs) are becoming increasingly important as a wide field of promising applications has emerged to serve millions of users distributed across the world.However,it is challenging to make... Group communication services (GCSs) are becoming increasingly important as a wide field of promising applications has emerged to serve millions of users distributed across the world.However,it is challenging to make the service fault tolerance and scalable to fulfill the voluminous demand of users in a distributed network (DN).While many reliable group communication protocols have been dedicated to addressing such a challenge so as to accommodate the changes in the network,they are often costly or require complicated strategies to handle the service interruptions caused by node departures or link failures,which hinders the service practicability.In this paper,we present two schemes to address the challenges.The first one is a location-aware replication scheme called NS,which makes replicas in a dispersed fashion that enables the services on nodes to gain immunity of failures with different patterns (e.g.,network partition and single point failure) while keeping replication overhead low.The second one is a novel failure recovery scheme that exploits the independence between service recovery and structure recovery in time domain to achieve quick failure recovery.Our simulation results indicate that the two proposed schemes outperform the existing schemes and simple alternative schemes in service success rate,recovery latency,and communication cost. 展开更多
关键词 fault tolerance failure recovery REPLICATION LOCATION group communication
原文传递
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
7
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
在线阅读 下载PDF
HUFFMAN-BASED GROUP KEY ESTABLISHMENT SCHEME WITH LOCATION-AWARE
8
作者 Gu Xiaozhuo Yang Jianzu Lan Julong 《Journal of Electronics(China)》 2009年第2期237-243,共7页
Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-... Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme. 展开更多
关键词 Secure group communication Contributory group key management group key estab-lishment
在线阅读 下载PDF
Prediction of Group Delay Distribution Around Receiving Point Using Modified IRI Model and IGRF Model 被引量:1
9
作者 YAN Zhaowen WANG Gang +2 位作者 LI Weimina YU Dapeng Toyobur RAHMAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2011年第6期797-806,共10页
The international reference ionosphere (IRI) model is generally accepted standard ionosphere model. It describes the ionosphere environment in quiet state and predicts the ionosphere parameters within a certain prec... The international reference ionosphere (IRI) model is generally accepted standard ionosphere model. It describes the ionosphere environment in quiet state and predicts the ionosphere parameters within a certain precision. In this paper, we have made a breakthrough in the application of the IRI model by modifying the model for regions of China. The main objectives of this modification are to construct the ionosphere parameters foF2 and M (3000) F2 by using the Chinese reference ionosphere (CRI) coefficients, appropriately increase hmE and hmF2 height, reduce the thickness of F layer, validate the parameter by the measured values, and solve the electron concentration distribution with quasi-parabolic segment (QPS). In this paper, 3D ray tracing algorithm is constructed based on the modified IRI model and international geomagnetic reference field (IGRF) model. In short-wave propagation, it can be used to predict the electromagnetic parameters of the receiving point, such as the receiving area, maximum useable frequency (MUF) and the distribution of the group delay etc., which can help to determine the suitability of the communication. As an example, we estimate the group delay distributions around Changchun in the detection from Qingdao to Changchun using the modified IRI model and IGRF model, and provide technical support for the short-wave communication between the two cities. 展开更多
关键词 IRI IGRF ray tracing short-wave communication group delay
原文传递
Algorithm for Delay-Constrained Minimal Cost Group Multicasting
10
作者 孙雨耕 王燕琳 阎新芳 《Transactions of Tianjin University》 EI CAS 2005年第4期283-288,共6页
Group multicast routing algorithms satisfying quality of service requirements of real-time applications are essential for high-speed networks. A heuristic algorithm was presented for group multicast routing with bandw... Group multicast routing algorithms satisfying quality of service requirements of real-time applications are essential for high-speed networks. A heuristic algorithm was presented for group multicast routing with bandwidth and delay constrained. A new metric was designed as a function of available bandwidth and delay of link. And source-specific routing trees for each member were generated in the algorithm by using the metric, which satisfy member′s bandwidth and end-to-end delay requirements. Simulations over random network were carried out to compare the performance of the proposed algorithm with that from literature.Experimental results show that the algorithm performs better in terms of network cost and ability in constructing feasible multicast trees for group members. Moreover,the algorithm can avoid link blocking and enhance the network behavior efficiently. 展开更多
关键词 group multicast multimedia communication quality of service traffic balancing
在线阅读 下载PDF
Towards a Shared Future Top 10 News Stories on 2024 China-ASEAN Cooperation release ceremony in Nanning, Guangxi
11
作者 Guo Xixian 《China Report ASEAN》 2025年第4期48-50,共3页
On February 27,the release ceremony of the Top 10 News Stories on 2024 China-Asean Cooperation took place in Nanning,capital of Guangxi Zhuang Autonomous Region.The event was organized under the guidance of the China ... On February 27,the release ceremony of the Top 10 News Stories on 2024 China-Asean Cooperation took place in Nanning,capital of Guangxi Zhuang Autonomous Region.The event was organized under the guidance of the China International Communications Group(CICG),China Foreign Affairs University(CFAU),and the Publicity Department of the Party Committee of Guangxi Zhuang Autonomous Region.It was jointly hosted by CICG Asia-Pacific,the Institute of Asian Studies of CFAU,and Guangxi University. 展开更多
关键词 China ASEAN cooperation top news stories China Foreign Affairs University China International communications group publicity department institute asian studies
在线阅读 下载PDF
Towards a Green Future Beijing Municipal Administrative Center is emerging as a new hub for China-ASEAN cooperation
12
《China Report ASEAN》 2025年第12期18-19,共2页
On October 21,2025,the ASEAN-China(Beijing Municipal Administrative Center)Trade and Investment Promotion Conference took place at the Beijing International Fortune Center.Under the theme“Joining Hands for Green Deve... On October 21,2025,the ASEAN-China(Beijing Municipal Administrative Center)Trade and Investment Promotion Conference took place at the Beijing International Fortune Center.Under the theme“Joining Hands for Green Development and a Better Future,”the conference was supervised by China International Communications Group(CICG)and co-hosted by ASEAN-China Centre(ACC),Beijing Municipal Administrative Center Management Committee,Beijing Tongzhou District People’s Government,and CICG Asia-Pacific. 展开更多
关键词 trade investment better future COOPERATION ASEAN China cooperation green development china international communications group cicg Beijing Municipal Administrative Center trade promotion
在线阅读 下载PDF
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
13
作者 Zhuo Zhao Chingfang Hsu +3 位作者 Lein Harn Zhe Xia Xinyu Jiang Liu Liu 《Cybersecurity》 2025年第4期57-70,共14页
As mobile internet and Internet of Things technologies continue to advance,the application scenarios of peer-to-peer Internet of Drones(IoD)are becoming increasingly diverse.However,the development of IoD also faces s... As mobile internet and Internet of Things technologies continue to advance,the application scenarios of peer-to-peer Internet of Drones(IoD)are becoming increasingly diverse.However,the development of IoD also faces signifcant challenges,such as security,privacy protection,and limited computing power,which require technological innova-tion to overcome.For group secure communication,it is necessary to provide two basic services,user authentication and group key agreement.Due to the limited storage of IoD devices,group key negotiation requires lightweight calculations,and conventional schemes cannot satisfy the requirements of group communication in the IoD.To this end,a new lightweight communication scheme based on ring neighbors is presented in this paper for IoD,which not only realizes the identity verifcation of user and group key negotiation,but also improves computational ef-ciency on each group member side.A detailed security analysis substantiates that the designed scheme is capable of withstanding attacks from both internal and external adversaries while satisfying all defned security requirements.More importantly,in our proposal,the computational cost on the user side remains unafected by the variability of the number of members participating in group communication,as members communicate in a non-interactive manner through broadcasting.As a result,the protocol proposed in this article demonstrates lower computational and communication costs in comparison to other cryptographic schemes.Hence,this proposal presents a more appealing approach to lightweight group key agreement protocol with user authentication for application in the IoD. 展开更多
关键词 IoD Secure group communications group key agreement User authentication Asymmetric bivariate polynomial Lightweight ring-neighbor-based
原文传递
Applying Communicative Teaching Method in English-teaching Classroom 被引量:2
14
作者 Hongzhi Hu Jianpin Wu 《Sino-US English Teaching》 2005年第9期35-38,共4页
Communicative language teaching is generally accepted in the field of second language teaching. In this paper, the author introduces a model of communicative language teaching. The authors also mention some practical ... Communicative language teaching is generally accepted in the field of second language teaching. In this paper, the author introduces a model of communicative language teaching. The authors also mention some practical requirements and methods in the application of this model, such as authentic materials and group work. 展开更多
关键词 group work authentic materials Communicative Language Teaching (CLT)
在线阅读 下载PDF
Lightweight Trusted Security for Emergency Communication Networks of Small Groups
15
作者 Fugang Liu Jiawei Xu +2 位作者 Feng Hu Chao Wang Jie Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第2期195-202,共8页
Public communication infrastructures are susceptible to disasters. Thus, the Emergency Communication Networks(ECNs) of small groups are necessary to maintain real-time communication during disasters. Given that ECNs a... Public communication infrastructures are susceptible to disasters. Thus, the Emergency Communication Networks(ECNs) of small groups are necessary to maintain real-time communication during disasters. Given that ECNs are self-built by users, the unavailability of infrastructures and the openness of wireless channels render them insecure. ECN security, however, is a rarely studied issue despite of its importance. Here, we propose a security scheme for the ECNs of small groups. Our scheme is based on the optimized Byzantine Generals’ Problem combined with the analysis of trusted security problems in ECNs. Applying the Byzantine Generals’ Problem to ECNs is a novel approach to realize two new functions, debugging and error correction, for ensuring system consistency and accuracy. Given the limitation of terminal devices, the lightweight fast ECDSA algorithm is introduced to guarantee the integrity and security of communication and the efficiency of the network. We implement a simulation to verify the feasibility of the algorithm after theoretical optimization. 展开更多
关键词 emergency communication networks of small groups optimized Byzantine Generals' Problem fast ECDSA lightweight trusted security scheme based on Byzantine Generals' Problem
原文传递
Towards Interaction,Communication and Integration of Ethnic Groups with Commonality:A Comparison of Inner Mongolia,Guangxi and Ningxia Autonomous Region
16
作者 Naran Bilik Chunyang YU 《Journal of the Chinese Nation Studies》 2023年第4期111-130,共20页
One crucial measure of strengthening and advancing the Party's work on ethnic affairs in the new era is to promote interaction,communication and integration of various ethnic groups,so as to enhance commonality.En... One crucial measure of strengthening and advancing the Party's work on ethnic affairs in the new era is to promote interaction,communication and integration of various ethnic groups,so as to enhance commonality.Entering the new era,Inner Mongolia,Guangxi and Ningxia have achieved remarkable results in encouraging interaction,communication and integration of various ethnic groups.By comparatively analyzing successes of the three autonomous regions through the perspective of promoting commonality,this article summarizes the following strategic revelations:1)we should comprehensively implement the Party's ethnic policies and ensure theactual implementation of mutual interaction,mutual communication and mutual integration of ethnic groups;2)we should proactively promote the substantial progress of the economy,so as to provide solid material foundation for mutual interaction,mutual communication and mutual integration of ethnic groups;3)we should facilitate activities that promote ethnic unity and progress,so that the promotion of interaction,communication and mutual integration of ethnic groups can be seen,be felt and gain actual outcomes;4)we should take measures that suit to local conditions and explore all-round embedding mechanisms in order to foster the ethos for mutual interaction,mutual communication and mutual integration of ethnic groups;5)we should make every effort to forge a strong sense of community for the Chinese nation and orient precisely to the cause of encouraging mutual interaction,mutual communication and mutual integration of ethnic groups. 展开更多
关键词 interaction communication and integration of various ethnic groups ethnic work enhance commonality empirical comparison
原文传递
ZHEJIANG'S COUNTRYSIDE CODE
17
作者 Tao Xing 《Beijing Review》 2025年第51期12-16,共5页
Editor's Note:From November 30 to December 7,several China International Communications Group media outlets,including Beijing Review,China Today,China.org.cn,China Report ASEAN and China Pictorial,visited multiple... Editor's Note:From November 30 to December 7,several China International Communications Group media outlets,including Beijing Review,China Today,China.org.cn,China Report ASEAN and China Pictorial,visited multiple villages and towns in Huzhou,Jiaxing and Ningbo cities in Zhejiang Province to explore the transformation currently underway in China's rural areas. 展开更多
关键词 china international communications group beijing review china today december china org cn huzhou china report asean china pictorial
原文传递
From Ancient Wonders to New Energy
18
作者 Wang Ruohan 《Beijing Review》 2025年第23期38-39,共2页
As part of continued efforts to increase cultural understanding between China and other countries,four international experts embarked on an exploration of Chongqing Municipality and Sichuan Province from May 24 to 27.... As part of continued efforts to increase cultural understanding between China and other countries,four international experts embarked on an exploration of Chongqing Municipality and Sichuan Province from May 24 to 27.Dubbed the"Understanding China"tour,the program was organized by China International Communications Group(CICG)for the judges of the second Orchid Awards,whose shortlist of 30 nominees was announced on May 22. 展开更多
关键词 new energy increase cultural understanding cultural understanding understanding chinatour orchid awards china international communications group cicg ancient wonders Sichuan province
原文传递
English Edition of Hi,I'm China Holds Launch Event in Beijing
19
《China Book International》 2025年第6期62-63,共2页
On the afternoon of September 29,2025,as part of the Beijing-Tianjin-Hebei Outstanding Popular Science Book Catalog Release and Popular Science Creation&Publishing Exchange Conference,the launch event for the Engl... On the afternoon of September 29,2025,as part of the Beijing-Tianjin-Hebei Outstanding Popular Science Book Catalog Release and Popular Science Creation&Publishing Exchange Conference,the launch event for the English edition of Hi,I'm China was held at the Beijing Library.Xie Gang,vice president of China International Communications Group,and Nie Zhenning,head of the national reading committee at the Publishers Association of China,attended the event and officially unveiled the new book.Representatives of readers from multiple countries,along with experts and scholars from various fields,were invited to participate. 展开更多
关键词 Beijing Library English edition launch event Beijing Tianjin Hebei outstanding popular science book catalog Hi Im China popular science book China International communications group popular science creation publishing exchange conference
原文传递
SeaHttp:A Resource-Oriented Protocol to Extend REST Style for Web of Things 被引量:4
20
作者 侯陈达 李栋 +2 位作者 邱杰凡 石海龙 崔莉 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第2期205-215,共11页
Web of Things (WoT) makes it possible to connect tremendous embedded devices to web in Representational State Transfer (REST) style. Some lightweight RESTful protocols have been proposed for the WoT to replace the... Web of Things (WoT) makes it possible to connect tremendous embedded devices to web in Representational State Transfer (REST) style. Some lightweight RESTful protocols have been proposed for the WoT to replace the HTTP protocol running on embedded devices. However, they keep the principal characteristic of the REST style. In particular, they support one-to-one requests in the client-server mode by four standard RESTful methods (GET, PUT, POST, and DELETE). This characteristic is however inconsistent with the practical networks of embedded devices, which typically perform a group operation. In order to meet the requirement of group communication in the WoT, we propose a resource-oriented protocol called SeaHttp to extend the REST style by introducing two new methods, namely BRANCH and COMBINE respectively. SeaHttp supports parallel processing of group requests by means of splitting and merging them. In addition SeaHttp adds spatiotemporal attributes to the standard URI for naming a dynamic request group of physical resource. Experimental results show that SeaHttp can reduce average energy consumption of group communication in the WoT by 18.5%, compared with the Constrained Application Protocol (CoAP). 展开更多
关键词 cloud-sea computing Web of Things RESOURCE-ORIENTED group communication spatiotemporal attribute
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部