2011 International Conference on Network Computing and Information Security最新文献

筛选
英文 中文
Design and Implementation of Current Distribution Monitoring Program in Aluminum Reduction Cell 铝电解槽电流分布监测方案的设计与实现
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.169
Zhifang Zhang, Rentao Zhao, J. Tie
{"title":"Design and Implementation of Current Distribution Monitoring Program in Aluminum Reduction Cell","authors":"Zhifang Zhang, Rentao Zhao, J. Tie","doi":"10.1109/NCIS.2011.169","DOIUrl":"https://doi.org/10.1109/NCIS.2011.169","url":null,"abstract":"Anode and cathode current distribution is an important technology parameter in the process of aluminum production, but the currently used simple methods of analysis and detection can not meet the needs for current distribution online monitoring. The development of current distribution online monitoring system achieves the online monitoring and real-time analysis of current distribution in aluminum reduction cell. The system changes the operation mode of parameter measurement, data storage and analysis in the current electrolytic aluminum industry, provides a tool for further study of aluminum electrolysis process and the electrolyzer operational conditions, improves the production-line workers' data measurement efficiency, eliminates the data errors in the process of traditional data entry, and improves efficiency of data use. Actual operating results prove that the system has a good promotional value.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Qubit Extraction for Free-Space Quantum Key Distribution 自由空间量子密钥分发的量子比特提取
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.55
Bo Zhong, Weiyue Liu, Chong Li, Z. Jiang, Yanlin Tang, Yang Liu, Bin Yang, Xiaofang Hu, Qi Shen, Chenzhi Peng
{"title":"Qubit Extraction for Free-Space Quantum Key Distribution","authors":"Bo Zhong, Weiyue Liu, Chong Li, Z. Jiang, Yanlin Tang, Yang Liu, Bin Yang, Xiaofang Hu, Qi Shen, Chenzhi Peng","doi":"10.1109/NCIS.2011.55","DOIUrl":"https://doi.org/10.1109/NCIS.2011.55","url":null,"abstract":"Qubit extraction is used in quantum key distribution systems to recover qubit sequences from quantum signals. This paper introduces the principle of quantum key distribution based on BB84 protocol and the realization of qubits extraction for free space quantum cryptography system.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Digital Content Nested Protection in the Research of Digital Content Lifecycle Protection 数字内容生命周期保护研究中的数字内容嵌套保护分析
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.16
Mei Xue, Deren Yang
{"title":"Analysis of Digital Content Nested Protection in the Research of Digital Content Lifecycle Protection","authors":"Mei Xue, Deren Yang","doi":"10.1109/NCIS.2011.16","DOIUrl":"https://doi.org/10.1109/NCIS.2011.16","url":null,"abstract":"Content Lifecycle Protection (CLP) employs 'Box' to wrap content into BCO so that Box can supervise and protect inside content during each phase of lifecycle. BCO is the core of CLP. In this paper, based on the CLP concept, we analyze the content nested protection and present the BCO physical coupling structures after the nested protection. At the end of this paper, the application experiment is implemented and shows how the BCO works in the content twice-nested protection.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Effective IP Trace Publishing Using Data Sketch 具有成本效益的IP跟踪发布使用数据草图
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.44
Lihua Miao, W. Ding, Haiting Zhu, Qin Xia
{"title":"Cost-Effective IP Trace Publishing Using Data Sketch","authors":"Lihua Miao, W. Ding, Haiting Zhu, Qin Xia","doi":"10.1109/NCIS.2011.44","DOIUrl":"https://doi.org/10.1109/NCIS.2011.44","url":null,"abstract":"IP Traces are sets of IP packets (or packet headers) captured at the measuring point. Their publishing, which is most challenged by massive size concern, is crucial for network research. In this paper, we propose a new scheme for IP Trace publishing which offers much smaller transportation quantity than the traditional methods. Based on Cisco's Net flow technique, the data provider first summarizes an original IP Trace to a sketch. During the summarizing process, extra statistics of certain fields in the original IP Trace are obtained. The sketch and the statistics, which are much smaller in size, are then published instead of the original IP Trace. Based on the Monte Carlo simulation technique, the data down loader can generate a synthetic IP Trace from the sketch and the statistics which preserves most of the statistical properties of the original IP Trace. According to our experiments, the transportation quantity of our scheme is only 3% of that in the traditional methods and meanwhile privacy is better protected. In the end, the utility of the synthetic IP Trace and that of the original IP Trace are compared using two network performance metrics (throughput and RTT). The result shows that this scheme is feasible.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
XBRL Metadata Repository and Continuous Data Mining XBRL元数据存储库和持续数据挖掘
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.41
Ding Pan, Yunshan Pan
{"title":"XBRL Metadata Repository and Continuous Data Mining","authors":"Ding Pan, Yunshan Pan","doi":"10.1109/NCIS.2011.41","DOIUrl":"https://doi.org/10.1109/NCIS.2011.41","url":null,"abstract":"XBRL uses internationally accepted network financial reporting standards to create a taxonomy which is allowed an exchangeable and extraction of data across all software and technologies. It make enterprise metadata repository involving XBRL metadata became one of the important research issues. The requirements of metadata management for XBRL documents and continuous data mining are described. Then a meta-model and architecture for a metadata repository and data mining are proposed, that are capable of storing and managing a cohesive enterprise view of metadata, maintaining integrity based on XBRL semantics, and integrating XBRL metadata to support continuous data mining process.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124743432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET 基于拍卖机制的簇头选举方案在MANET入侵检测中的应用
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.184
Yanqing Zeng, Zhide Chen, Cheng Qiao, Li Xu
{"title":"A Cluster Header Election Scheme Based on Auction Mechanism for Intrusion Detection in MANET","authors":"Yanqing Zeng, Zhide Chen, Cheng Qiao, Li Xu","doi":"10.1109/NCIS.2011.184","DOIUrl":"https://doi.org/10.1109/NCIS.2011.184","url":null,"abstract":"In this paper, we study the cluster head nodes election mechanism for cluster based intrusion detection in the presence of selfish nodes in Mobile Ad Hoc Networks (MANETs). To prolong the lifetime of all nodes, each cluster should elect a node with the most remaining energy as its cluster head. But, the selfish nodes may behave selfishly by lying about their remaining energy and avoiding being elected. We represent the existence of selfish nodes really has a bad effect on the lifetime of the networks and propose a solution based on auction mechanism. More specifically, we design a mechanism with the following attributes: First, the mechanism can always elect the most energy remaining nodes as cluster heads. Second, the mechanism can encourage the selfish nodes behave honestly by providing incentives. Simulation results show that our mechanism can effectively prolong the overall lifetime of Intrusion Detection System (IDS) in MANET.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124810683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improved Proxy Signature for Designated Verifier 改进的指定验证者代理签名
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.52
Zhang Xinjing, Huang Shoujia, Xin Xiangjun
{"title":"Improved Proxy Signature for Designated Verifier","authors":"Zhang Xinjing, Huang Shoujia, Xin Xiangjun","doi":"10.1109/NCIS.2011.52","DOIUrl":"https://doi.org/10.1109/NCIS.2011.52","url":null,"abstract":"To overcome the disadvantages of designated-verifier signature schemes proposed by Dai and Wang, based on the Schnorr signature scheme, an improved designated-verifier signature scheme is proposed. The proposed scheme overcomes weakness of the schemes proposed by Dai and Wang. According to the security analysis, it is found that the new scheme is secure under the hardness assumption of discrete logarithm. On the other hand, the new scheme is more efficient than Wang's scheme due to its fewer exchanges than Wang's.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Current-Mode Nth-Order Multifunction Filter Using Minimum Number of DVCCs 一种采用最小dvcc数的电流模式n阶多功能滤波器
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.160
Ping-hua Zhang, Xi-feng Zhou, Shan Xiao
{"title":"A Current-Mode Nth-Order Multifunction Filter Using Minimum Number of DVCCs","authors":"Ping-hua Zhang, Xi-feng Zhou, Shan Xiao","doi":"10.1109/NCIS.2011.160","DOIUrl":"https://doi.org/10.1109/NCIS.2011.160","url":null,"abstract":"In this paper, a nth-order current-mode universal filter based on differential voltage current conveyors (DVCCs) is proposed. Using minimum number of passive Components, The filter obtained from the proposed structure can simultaneously realize low-pass, band-pass, all-pass, high-pass and band-reject responses by choosing appropriate input branches without changing the passive elements. The obtained nth-order filter is only composed by n DVCCs and n capacitors and n resistors. All capacitors and resistors are grounded, which is integrated conveniently and is compatible with VLSI technology. The proposed filter requires no active and passive element matching conditions and/or cancellation constraints. Additionally, a universal biquadratic filter as an example is introduced. The second-order filter has low active and passive element sensitivities, and offers orthogonal control of the angular resonance frequency (?o) and quality factor (Q). HSPICE simulations are performed employing 0.18μm CMOS process and the performance simulation results are tested by comparing with the theoretical results of the filter.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm 基于蚁群算法的免疫入侵检测器生成算法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.124
Xiaowei Wang, Li-na Sun
{"title":"Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm","authors":"Xiaowei Wang, Li-na Sun","doi":"10.1109/NCIS.2011.124","DOIUrl":"https://doi.org/10.1109/NCIS.2011.124","url":null,"abstract":"In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shedding New Light on Reason for Conflict between Evidences 对证据冲突原因的新认识
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.180
LiFang Hu, Jia-qi Liu, Xin Guan, Wei-jia Liu, Ting-ting Zhou
{"title":"Shedding New Light on Reason for Conflict between Evidences","authors":"LiFang Hu, Jia-qi Liu, Xin Guan, Wei-jia Liu, Ting-ting Zhou","doi":"10.1109/NCIS.2011.180","DOIUrl":"https://doi.org/10.1109/NCIS.2011.180","url":null,"abstract":"The Dempster-Shafer evidence theory (DST) is widely used in many fields of information fusion. However, counter-intuitive results may be obtained by the classical Dempster combination rule (DRC) when collected evidences conflict highly with each other. However, Haenni gave confutation based on Zadeh's criticism of DRC, reasons for conflict between evidences concluded by him were not comprehensive. So, reasons for conflict between evidences are analyzed and summarized in this paper, that is, sensor reliability, incompleteness of the frame of discernment which is also called imprecise definition of GBBA model, and integration results of the above two reasons are the material reasons for conflict.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131513501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信