The techniques for oceanographic observation have made great progress in both space-time coverage and quality, which make the observation data present some characteristics of big data. We explore the essence of global...The techniques for oceanographic observation have made great progress in both space-time coverage and quality, which make the observation data present some characteristics of big data. We explore the essence of global ocean dynamic via constructing a complex network with regard to sea surface temperature. The global ocean is divided into discrete regions to represent the nodes of the network. To understand the ocean dynamic behavior, we introduce the Gaussian mixture models to describe the nodes as limit-cycle oscillators. The interacting dynamical oscillators form the complex network that simulates the ocean as a stochastic system. Gaussian probability matching is suggested to measure the behavior similarity of regions. Complex network statistical characteristics of the network are analyzed in terms of degree distribution, clustering coefficient and betweenness. Experimental results show a pronounced sensitivity of network characteristics to the climatic anomaly in the oceanic circulation. Particularly, the betweenness reveals the main pathways to transfer thermal energy of El Niño–Southern oscillation. Our works provide new insights into the physical processes of ocean dynamic, as well as climate changes and ocean anomalies.展开更多
Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infr...Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.展开更多
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically se...In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.U1706218,61971388,and L1824025).
文摘The techniques for oceanographic observation have made great progress in both space-time coverage and quality, which make the observation data present some characteristics of big data. We explore the essence of global ocean dynamic via constructing a complex network with regard to sea surface temperature. The global ocean is divided into discrete regions to represent the nodes of the network. To understand the ocean dynamic behavior, we introduce the Gaussian mixture models to describe the nodes as limit-cycle oscillators. The interacting dynamical oscillators form the complex network that simulates the ocean as a stochastic system. Gaussian probability matching is suggested to measure the behavior similarity of regions. Complex network statistical characteristics of the network are analyzed in terms of degree distribution, clustering coefficient and betweenness. Experimental results show a pronounced sensitivity of network characteristics to the climatic anomaly in the oceanic circulation. Particularly, the betweenness reveals the main pathways to transfer thermal energy of El Niño–Southern oscillation. Our works provide new insights into the physical processes of ocean dynamic, as well as climate changes and ocean anomalies.
文摘Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.
文摘In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties