eMule是建立在点对点(peer to peer)技术上,以eDonkey协议为基础的文件共享软件。eMule的集中程度是混合性的,并非是完全无中心服务器。文章从协议的角度论述了eMule是如何实现文件共享,分析了客户端到服务器端、客户端到客户端之间的TC...eMule是建立在点对点(peer to peer)技术上,以eDonkey协议为基础的文件共享软件。eMule的集中程度是混合性的,并非是完全无中心服务器。文章从协议的角度论述了eMule是如何实现文件共享,分析了客户端到服务器端、客户端到客户端之间的TCP通讯、UDP通讯的原理及相关的信息序列图。展开更多
【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Hands...【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Handshake、Ethereum Name Service等几种系统的设计架构、技术方案,并对不同项目进行了对比分析。【结果】相较于现有DNS系统,基于区块链的网络空间标识实现了安全平等、抗审查的网络基础架构,并且在数字认证、全球统一身份标识等领域积极探索展开合作,得到了一定程度的应用。【结论】基于区块链的网络空间标识服务为未来网络基础资源发展提供了一种新的思路与趋势,同时也面临着如何处理与现有系统的关系及广泛推广等问题。展开更多
在SOC(System On Chip)设计中,随着数字系统复杂性的提高,系统芯片中集成了越来越多的模块,这些模块通常工作在不同的时钟频率下.各控制器或者模块之间进行数据访问时,需要在将多bits数据同步到不同的时钟下.从跨时钟域时异步信号带来...在SOC(System On Chip)设计中,随着数字系统复杂性的提高,系统芯片中集成了越来越多的模块,这些模块通常工作在不同的时钟频率下.各控制器或者模块之间进行数据访问时,需要在将多bits数据同步到不同的时钟下.从跨时钟域时异步信号带来的亚稳态问题及其造成的影响,提出了包括握手信号和FIFO等针对不同的异步信号传输进行不同的跨时钟设计.展开更多
An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a loca...An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a local clock generator. Two approaches for the implementation of communication ports are presented, one with pure standard cells and the others with Mttller-C elements. The detailed design methodology for GALS systems is given and the circuits are validated with VHDL and circuits simulation in standard CMOS technology.展开更多
A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and pr...A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.展开更多
Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches ...Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches to detect the handshake between users, and use the shaking information to create security keys that are highly random. Thus, we perform device pairing without complicated operations. SDP dynamically adjusts the sensor's sampling frequency and uses different classifiers at varying stages to save the energy. A multi-level quantization algorithm is used to maximize the mutual information between two communicating entities without information leakage. We evaluate the main modules of SDP with 1800 sets of handshake data. Results show that the recognition accuracy of the handshake detection algorithm is 98.2%, and the power consumption is only 1/3 of that of the single sampling frequency classifier.展开更多
IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specifi...IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specified.In IEEE 802.16e,SA-TEK 3-way handshake is added into PKM protocols,aiming to facilitate re-authentication and key distribution.This paper analyzes the SA-TEK 3-way handshake protocol,and proposes an optimized version.We also use CasperFDR,a popular formal analysis tool,to verify our analysis.Moreover,we model various simplified versions to find the functions of those elements in the protocol,and correct some misunderstandings in related works using other formal analysis tools.展开更多
Formerly opponents, international record company EMI and Chinese search engine Baidu.com have launched an Internet venture, but this model has yet to be
The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve...The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve the communication competence.展开更多
文摘eMule是建立在点对点(peer to peer)技术上,以eDonkey协议为基础的文件共享软件。eMule的集中程度是混合性的,并非是完全无中心服务器。文章从协议的角度论述了eMule是如何实现文件共享,分析了客户端到服务器端、客户端到客户端之间的TCP通讯、UDP通讯的原理及相关的信息序列图。
文摘【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Handshake、Ethereum Name Service等几种系统的设计架构、技术方案,并对不同项目进行了对比分析。【结果】相较于现有DNS系统,基于区块链的网络空间标识实现了安全平等、抗审查的网络基础架构,并且在数字认证、全球统一身份标识等领域积极探索展开合作,得到了一定程度的应用。【结论】基于区块链的网络空间标识服务为未来网络基础资源发展提供了一种新的思路与趋势,同时也面临着如何处理与现有系统的关系及广泛推广等问题。
文摘在SOC(System On Chip)设计中,随着数字系统复杂性的提高,系统芯片中集成了越来越多的模块,这些模块通常工作在不同的时钟频率下.各控制器或者模块之间进行数据访问时,需要在将多bits数据同步到不同的时钟下.从跨时钟域时异步信号带来的亚稳态问题及其造成的影响,提出了包括握手信号和FIFO等针对不同的异步信号传输进行不同的跨时钟设计.
文摘An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a local clock generator. Two approaches for the implementation of communication ports are presented, one with pure standard cells and the others with Mttller-C elements. The detailed design methodology for GALS systems is given and the circuits are validated with VHDL and circuits simulation in standard CMOS technology.
文摘A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.
基金supported in part by the National Natural Science Foundation of China (Nos. 61472219 and 61672372)Shaanxi NSF (No. 2017JM6109)
文摘Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches to detect the handshake between users, and use the shaking information to create security keys that are highly random. Thus, we perform device pairing without complicated operations. SDP dynamically adjusts the sensor's sampling frequency and uses different classifiers at varying stages to save the energy. A multi-level quantization algorithm is used to maximize the mutual information between two communicating entities without information leakage. We evaluate the main modules of SDP with 1800 sets of handshake data. Results show that the recognition accuracy of the handshake detection algorithm is 98.2%, and the power consumption is only 1/3 of that of the single sampling frequency classifier.
基金the Startup Research Fund for the Doctoral Faculty of Shenyang University of Chemical Technology(No.51045084)。
文摘IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specified.In IEEE 802.16e,SA-TEK 3-way handshake is added into PKM protocols,aiming to facilitate re-authentication and key distribution.This paper analyzes the SA-TEK 3-way handshake protocol,and proposes an optimized version.We also use CasperFDR,a popular formal analysis tool,to verify our analysis.Moreover,we model various simplified versions to find the functions of those elements in the protocol,and correct some misunderstandings in related works using other formal analysis tools.
文摘Formerly opponents, international record company EMI and Chinese search engine Baidu.com have launched an Internet venture, but this model has yet to be
文摘The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve the communication competence.