A new algorithm called spatially aware routing algorithm with enhanced learning (SAREL) is proposed to guarantee the rationality of route selecting in inter-vehicle communication scenario. Firstly, the traffic model i...A new algorithm called spatially aware routing algorithm with enhanced learning (SAREL) is proposed to guarantee the rationality of route selecting in inter-vehicle communication scenario. Firstly, the traffic model is discussed and set up by using Poisson distribution. Then we analyze the process of traffic evaluation with enhanced learning, and exploit movement estimation to assist state memorization. The improvement of algorithm is provided at last compared with our previous work. Simulation results show that SAREL algorithm could achieve better performance in packet delivery ratio, especially when network connection ratio is average. Key words mobile ad hoc network - spatially aware routing - enhanced learning CLC number TP 316 Foundation item: Supported by Open Laboratory Foundation by China Ministry of Education (TKLJ9903), Project CarTALK 2000 by the European Commission (IST-2000-28185) and Project FleetNet-Internet on the Road by the German Ministry of Education and Research (01AK025)Biography: HAN Lu (1974-), male, Ph. D candidate, research direction; distributed artificial intelligence.展开更多
We analyze the common shortcoming in the existing agent MTPs (message transport protocols). With employing the File object and related service AtomicWriteFile of BACnet (a data communication protocol building automati...We analyze the common shortcoming in the existing agent MTPs (message transport protocols). With employing the File object and related service AtomicWriteFile of BACnet (a data communication protocol building automation and control networks), a new method of agent message transport is proposed and implemented. Every agent platform (AP) has one specified File object and agents in another AP can communicate with agents in the AP by using AtomicWriteFile service. Agent messages can be in a variety of formats. In implementation, BACnet/IP and Ethernet are applied as the BACnet data link layers respectively. The experiment results show that the BACnet can provide perfect support for agent communication like other conventional protocols such as hypertext transfer protocol (HTTP), remote method invocation (RMI) etc, and has broken through the restriction of TCP/IP. By this approach, the agent technology is introduced into the building automation control network system. Key words agent platform - BACnet - HTTP - Java - file object CLC number TP 393.03 - TP 312 Foundation item: Supported by the Foundation of the Key Laboratory of Education Ministry for Image Processing and Intelligent Control (TKLJ0116)Biography: Jiang Wen-bin (1975-), male, Ph. D candidate, research direction: agent technology, network communication.展开更多
To solve the drawback of the present electionic cash (E-cash) schemes that the size of bank's transcripts database expands without bound, the concept of validity duration of E-cash is introduced in this paper. Thr...To solve the drawback of the present electionic cash (E-cash) schemes that the size of bank's transcripts database expands without bound, the concept of validity duration of E-cash is introduced in this paper. Through improving the users' blind transforms of Brands' scheme, we design an efficient off-line E-cash system based on the restrictive blind signature and representation problem. The security analysis shows that the users can not forge a valid electronic coin or double spend it, in addition, the bank can not trace an honest users' payment behaviours. In compare with Brand's scheme, our scheme reduces storage costs and computation overhead of the users and the banks. Most of all, the electronic cashes will be authorized within a limit period only, the size of bank's transcripts database becomes controllable. Key words E-cash - restrictive blind signature - validity duration - non-trivial representation - double spending CLC number TP 309.2 Foundation item: Supported by the National Natural Science Foundation of China (90104033)Biography: Peng Bing (1972-), male, Ph. D. candidate, research direction: information security, electronic payment and modern cryptography.展开更多
An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from gen...An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature.展开更多
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite...The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.展开更多
文摘A new algorithm called spatially aware routing algorithm with enhanced learning (SAREL) is proposed to guarantee the rationality of route selecting in inter-vehicle communication scenario. Firstly, the traffic model is discussed and set up by using Poisson distribution. Then we analyze the process of traffic evaluation with enhanced learning, and exploit movement estimation to assist state memorization. The improvement of algorithm is provided at last compared with our previous work. Simulation results show that SAREL algorithm could achieve better performance in packet delivery ratio, especially when network connection ratio is average. Key words mobile ad hoc network - spatially aware routing - enhanced learning CLC number TP 316 Foundation item: Supported by Open Laboratory Foundation by China Ministry of Education (TKLJ9903), Project CarTALK 2000 by the European Commission (IST-2000-28185) and Project FleetNet-Internet on the Road by the German Ministry of Education and Research (01AK025)Biography: HAN Lu (1974-), male, Ph. D candidate, research direction; distributed artificial intelligence.
文摘We analyze the common shortcoming in the existing agent MTPs (message transport protocols). With employing the File object and related service AtomicWriteFile of BACnet (a data communication protocol building automation and control networks), a new method of agent message transport is proposed and implemented. Every agent platform (AP) has one specified File object and agents in another AP can communicate with agents in the AP by using AtomicWriteFile service. Agent messages can be in a variety of formats. In implementation, BACnet/IP and Ethernet are applied as the BACnet data link layers respectively. The experiment results show that the BACnet can provide perfect support for agent communication like other conventional protocols such as hypertext transfer protocol (HTTP), remote method invocation (RMI) etc, and has broken through the restriction of TCP/IP. By this approach, the agent technology is introduced into the building automation control network system. Key words agent platform - BACnet - HTTP - Java - file object CLC number TP 393.03 - TP 312 Foundation item: Supported by the Foundation of the Key Laboratory of Education Ministry for Image Processing and Intelligent Control (TKLJ0116)Biography: Jiang Wen-bin (1975-), male, Ph. D candidate, research direction: agent technology, network communication.
文摘To solve the drawback of the present electionic cash (E-cash) schemes that the size of bank's transcripts database expands without bound, the concept of validity duration of E-cash is introduced in this paper. Through improving the users' blind transforms of Brands' scheme, we design an efficient off-line E-cash system based on the restrictive blind signature and representation problem. The security analysis shows that the users can not forge a valid electronic coin or double spend it, in addition, the bank can not trace an honest users' payment behaviours. In compare with Brand's scheme, our scheme reduces storage costs and computation overhead of the users and the banks. Most of all, the electronic cashes will be authorized within a limit period only, the size of bank's transcripts database becomes controllable. Key words E-cash - restrictive blind signature - validity duration - non-trivial representation - double spending CLC number TP 309.2 Foundation item: Supported by the National Natural Science Foundation of China (90104033)Biography: Peng Bing (1972-), male, Ph. D. candidate, research direction: information security, electronic payment and modern cryptography.
文摘An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature.
文摘The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering.