期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A novel approach to authenticated group key transfer protocol based on AG codes
1
作者 Yuan Dezhai Peng Xingyi +1 位作者 Liu Ting Cui Zhe 《High Technology Letters》 EI CAS 2019年第2期129-136,共8页
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to... Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security. 展开更多
关键词 group key transfer protocol erasure code AG codes non-repeatability CONFIDENTIALITY AUTHENTICATION
在线阅读 下载PDF
Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture
2
作者 Khawaja Tahir Mehmood Shahid Atiq +2 位作者 Intisar Ali Sajjad Muhammad Majid Hussain Malik M.Abdul Basit 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1673-1708,共36页
Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DT... Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced. 展开更多
关键词 Software defined networking quality of service hypertext transfer protocol data transfer rate LATENCY maximum available bandwidth server load management
在线阅读 下载PDF
Accelerated transmission in peer-to-peer network
3
作者 庄艳艳 刘业 钮麟 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期226-231,共6页
The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network... The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory. 展开更多
关键词 peer to peer network transfer control protocol (TCP) available bandwidth
在线阅读 下载PDF
文物信息系统数据管理方法研究 被引量:2
4
作者 高国庆 李光亚 +2 位作者 张超 胡雅妮 韩晓东 《工业控制计算机》 2023年第3期110-112,共3页
针对当前文物信息系统在文件上传过程中存在的文件接收不全、文字乱码、传输无法随时终止等缺陷,研究了一种效率更高的文件上传解决方案。首先,该方案基于FTP协议对文件上传的可控性,保证了目录文件的完整传输,其次,通过断点续传技术解... 针对当前文物信息系统在文件上传过程中存在的文件接收不全、文字乱码、传输无法随时终止等缺陷,研究了一种效率更高的文件上传解决方案。首先,该方案基于FTP协议对文件上传的可控性,保证了目录文件的完整传输,其次,通过断点续传技术解决了服务端大文件传输时的中断响应问题;最后利用ConcurrentQueue分段存储技术和文件复位技术优化了客户端接收文件的完整性和精准度。经过大量测试,所提方案能有效修复了文物信息系统中关于文件传输功能的漏洞,提高文件上传效率。 展开更多
关键词 file transfer protocol 文件上传 分段存储 解决方案 信息系统
在线阅读 下载PDF
HAS Dynamic Buffer-Driven Resource Management to Enhance QoE in Mobile Network 被引量:2
5
作者 Fei Wang Zesong Fei Jing Wang 《China Communications》 SCIE CSCD 2017年第7期11-24,共14页
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag... Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics. 展开更多
关键词 resource management Hypertexl transfer protocol (HTTP) adaptive streaming (HAS) BUFFER rate request quality of experience (QoE) mobile network
在线阅读 下载PDF
Research and Implementation of FTAM File Transfer System
6
作者 Cao Yang Wu Kui Wu Xuhui 《Wuhan University Journal of Natural Sciences》 CAS 1997年第2期29-35,共7页
This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtu... This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system. 展开更多
关键词 file transfer file transfer protocol Virtual Filestore(VFS)
在线阅读 下载PDF
BIFURCATIONS AND CHAOS CONTROL IN TCP-RED SYSTEM
7
作者 刘芳 《Journal of Pharmaceutical Analysis》 SCIE CAS 2006年第1期1-5,共5页
Objective Analyzing the nonlinear dynamics of the TCP-RED congestion control system is of great importance. This study will help investigate the loss of stability in Internet and design a proper method for controlling... Objective Analyzing the nonlinear dynamics of the TCP-RED congestion control system is of great importance. This study will help investigate the loss of stability in Internet and design a proper method for controlling bifurcation and chaos in such system. Methods Based on bifurcation diagram, the effect of parameter on system performance is discussed. By using the state feedback and parameter variation strategy, a simple real time control method is proposed to modify the existing RED scheme. Results With our control method, the parametric sensitivity of RED mechanism is attenuated. Moreover, a sufficient condition on the robust stability of the system is also derived to adjust the parameters in TCP-RED system. Conclusion The proposed method has the advantages of simple implementation and unnecessary knowledge of the exact system. 展开更多
关键词 BIFURCATION CHAOS feedback control parameter variation congestion control transfer control protocol (TCP) random early detection (RED)
在线阅读 下载PDF
Application of mobile scanning agent in the network security
8
作者 闵君 冯珊 +1 位作者 唐超 梅纲 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期371-376,共6页
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a... To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent. 展开更多
关键词 AGENT network security IMMUNITY agent transfer protocol
在线阅读 下载PDF
A NOVEL MARKOV ANALYTICAL MODEL FOR THE TCP/AQM SYSTEMS
9
作者 Cao Zhenzhen Xiao Yang Chi Caixia 《Journal of Electronics(China)》 2010年第1期15-23,共9页
A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this mo... A novel closed-loop feedback TCP/AQM(Transfer Control Protocol/Active Queue Management) model is proposed in this paper using a discrete-time Markov chain,and a way to calculate the equilibrium distribution of this model is given.In the model,system time is divided into time slots,the bottleneck router queue model and TCP window size model in each slot are analyzed.Finally,by combining adjacent slots,an integrated TCP/AQM analytical model is developed.By this model,the average values of packets dropping ratio and queue length in the router and TCP sending rate can be estimated,hence,this model could be a useful tool for the analysis of AQMs and support the development of new AQM schemes theoretically.The proposed TCP/AQM model is extended to a TCP-UDP(Control User Datagram Protocol)/AQM model,to analyze the TCP/AQM system performance when UDP flows exist.By implementing this model on Matlab,we compare its solutions to NS2 simulated solutions,then the validity of the model to analyze the closed-loop feedback TCP/RED(Random Early Detection) system is verified. 展开更多
关键词 Transfer Control protocol(TCP) Active Queue Management(AQM) Markov chain Congestion control User Datagram protocol(UDP)
在线阅读 下载PDF
STUDY AND ENHANCEMENT ON BUFFER MANAGEMENT FOR SMOOTH HANDOVER IN MIPV6
10
作者 LinHuasheng JinYuehui ChengShiduan FanRui 《Journal of Electronics(China)》 2005年第2期131-141,共11页
For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handove... For improving Transfer Control Protocol (TCP) performance in mobile environment,smooth handover with buffer management has been proposed to realize seamless handovers. However in our simulation, even if smooth handover in Mobile IPv6 (MIPv6) is implemented, TCP can not always achieve better performance due to packets forwarding burst. Based on the study of buffer management for smooth handover, this paper proposes an enhanced buffer management scheme for smooth handover to improve TCP performance. In this scheme, a packet-pair probing technology is adopted to estimate the available bandwidth of the new path from Previous router (Prtr) to Mobile Node (MN), which will be used by Prtr to control the buffered packets forwarding. The simulation results demonstrate that smooth handover with this scheme can achieve better TCP performance than the original scheme. 展开更多
关键词 Transfer Control protocol (TCP) Smooth handover Buffer management Packet-pair technology
在线阅读 下载PDF
Secure oblivious transfer protocol from indistinguishability obfuscation
11
作者 Yuan Zheng Wang Mei Feng Xiao 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期1-10,共10页
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e... A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO. 展开更多
关键词 indistinguishability obfuscation (iO) oblivious transfer (OT) protocol dual-mode cryptosystem
原文传递
Measuring web page complexity by analyzing TCP flows and HTTP headers
12
作者 Cheng Weiqing Hu Yangyang +1 位作者 Yin Qiaofeng Chen Jiajia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第6期1-13,共13页
To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-... To understand website complexity deeply, a web page complexity measurement system is developed. The system measures the complexity of a web page at two levels: transport-level and content-level, using a packet trace-based approach rather than server or client logs. Packet traces surpass others in the amount of information contained. Quantitative analyses show that different categories of web pages have different complexity characteristics. Experimental results show that a news web page usually loads much more elements at more accessing levels from much more web servers within diverse administrative domains over much more concurrent transmission control protocol (TCP) flows. About more than half of education pages each only involve a few logical servers, where most of elements of a web page are fetched only from one or two logical servers. The number of content types for web game traffic after login is usually least. The system can help web page designers to design more efficient web pages, and help researchers or Internet users to know communication details. 展开更多
关键词 hyper text transfer protocol concurrent TCP flows world wide web web page complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部