ID |
原文 |
译文 |
20825 |
该文针对长码间接捕获方法的不足,以及扩展复制重叠捕获算法和均值捕获算法的局限性,提出一种以优化复杂度和搜索速度为目标的,基于扩展复制重叠捕获(XFAST)和均值算法相融合的时频捕获改进方法,给出了该算法的基本原理和捕获结果。 |
To overcome the shortcomings of the indirect acquisition method for long-code, the limitations of the extended replication overlay acquisition algorithm and the mean acquisition algorithm, an improved time-frequency capture method based on the Extended replica Folding Acquisition Search Technique (XFAST) and the mean algorithm is proposed. |
20826 |
对该算法的信噪比条件和复杂度进行了分析仿真,进一步论证了该算法应用于长码直接捕获的可行性和优良性。 |
The feasibility of the algorithm is simulated and the performance of the algorithm is analyzed. The simulation experiment shows the superiority of the proposed algorithm. |
20827 |
针对当前支持去重的属性加密方案既不支持云存储数据审计,又不支持过期用户撤销,且去重搜索和用户解密效率较低的问题,该文提出一种支持高效去重和审计的属性加密方案。 |
Existing attribute-based deduplication schemes can support neither auditing of cloud storage data norrevocation of expired users. On the other hand, they are less efficient for deduplication search and usersdecryption. In order to solve these problems, this paper proposes an efficient deduplication and auditing Attribute-Based Encryption (ABE) scheme. |
20828 |
该方案引入了第3方审计者对云存储数据的完整性进行检验,利用代理辅助用户撤销机制对过期用户进行撤销,又提出高效去重搜索树技术来提高去重搜索效率,并通过代理解密机制辅助用户解密。 |
A third-party auditor is introduced to verify the integrity of cloud storage data. Through an agent auxiliary user revocation mechanism, the proposed scheme supports the revocation of expired users. Effective deduplication search tree is put forward to improve the search efficiency, and the proxy decryption mechanism is used to assist users to decrypt. |
20829 |
安全性分析表明该方案通过采用混合云架构,在公有云达到IND-CPA安全性,在私有云达到PRV-CDA安全性。 |
Finally, the security analysis shows that the proposed scheme can achieve IND-CPA security in the public cloud and PRV-CDA security in the private cloud by resorting to the hybrid cloud architecture. |
20830 |
性能分析表明该方案的去重搜索效率更高,用户的解密计算量较小。 |
The performance analysis shows that the deduplication search is more efficient and the computation cost of user encryption is smaller. |
20831 |
针对已有的基于双马尔科夫链(PMC)模型的势概率假设密度(PMC-CPHD)滤波算法无法实现的问题,将PMC-CPHD算法改进为多项式形式以便于算法的实现,并给出了改进算法的高斯混合(GM)实现。 |
In view of the problem that the Cardinalized Probability Hypothesis Density (CPHD) probability hypothesis density filtering algorithm based on the Pairwise Markov Chains (PMC) model (PMC-CPHD) is not suitable for implementation, the PMC-CPHD algorithm is modified into a polynomial form to facilitate implementation, and the Gauss Mixture (GM) implementation of the improved algorithm is given. |
20832 |
实验结果表明给出的GM实现能够有效实现多目标跟踪,并且比基于PMC模型的概率假设密度(PMC-PHD)算法的GM实现提高了目标个数估计的稳定性。 |
The experimental results show that the given GM implementation realizes multitarget tracking effectively, and improves the stability of the target number estimation compared with the GM implementation of the probability hypothesis density filtering algorithm based on the PMC model (PMC-PHD). |
20833 |
侧信道攻击已经对高级加密标准(AES)的硬件安全造成严重威胁,如何抵御侧信道攻击成为目前亟待解决的问题。 |
Side channel attacks have serious threat to the hardware security of Advanced Encryption Standard(AES), how to resist the side channel attack becomes an urgent problem. |
20834 |
字节替换操作作为AES算法中唯一的非线性操作,提高其安全性对整个加密算法有重要意义。 |
Byte substitution operation is theonly nonlinear operation in AES algorithm, so it is very important for the whole encryption algorithm toimprove its security. |