http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Study of Deflection Routing from an Information-theoretic Perspective
Xinwei Zheng,Yuping Hu,Dongjun Luo,Xiaoyun Wu 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.1
Deflection routing is an effective way to improve the efficiency and reliability of data transmission in the network. Information theory, which is the foundation of channel communications, has not yet had a direct impact on network communications. In this paper, we study the deflection routing processes of point-to-point networks from an information-theoretic perspective. It is found that the packet routing processes, which can further be divided into path determination and path switching, are quite analogous to channel communications. And such a corresponding relationship makes it possible to analyze routing processes and its performance with models and concepts in the information theory.
Dongjun Luo,Xiaoyun Wu,Xinwei Zheng,Yuping Hu 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
Cloud computing platforms are usually constructed as trusted virtual platforms based on trusted computing technologies. This is one of the most effective approaches to resolve cloud computing security problems. However, the protection of sensitive data in trusted virtual platforms is an important problem needed to be resolved. In this paper, we proposed a novel authorization protocol. The protocol assembled the functions of OIAP, OSAP and AACP protocols, and prevented all known attacks in existing authorization protocols. Moreover, it satisfied the property of exclusivity and was compatible with TCG TPM command formats. The protocol effectively protects the sensitive data from unauthorized accesses in trusted cloud computing platforms.