A Secure Protocol for Sharing Trust Data in Hybrid P2P Network Huaiqing Lin and Yonghong Zhou Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing

نویسندگان

  • Mohammad S. Obaidat
  • Luis Sevillano
  • Mohamed Faten Zhani
  • Halima Elbiaze
  • Amin M. Abbosh
  • Yingyou Wen
  • Xuena Peng
  • Shuyi Chen
  • Chuanjun Xia
  • Yike Yu
  • Xuefeng Zheng
  • Sheng Yu
  • Shijie Zhou
  • Leyuan Liu
  • Rui Yang
  • Jiaqing Luo
  • Yi Sha
  • Mingming Li
  • Jiafu Chu
  • Shengbo Hu
  • Heng Shu
  • Tiancheng Lin
  • Yuanyuan Yang
  • Yu Liu
  • Qiang Shen
  • ZhiJun Zhao
چکیده

Optical buffering is known to significantly improve the performance of optical packet and burst switched networks and a number of useful analytic models for the case of Poisson traffic have been proposed previously. In this paper, we propose an approximate analytic model for generally distributed arrivals, specifically treating Gammadistributed interarrival times, and show that the variance of the traffic has a significant impact on performance. The analysis is formulated in terms of virtual traffic flows within the optical switch from which we derive expressions for burst blocking probability, fibre delay line occupancy and mean delay. Emphasis is on approximations, by way of momentmatching techniques, that give good numerical efficiency so that the method can be useful for formulating dimensioning problems for large-scale networks. Numerical solution values from the proposed analysis method are compared with results from a discrete-event simulation of an optical burst switch.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Protocol for Sharing Trust Data in Hybrid P2P Network

The trust data is critical to the trust model of P2P system. In this paper we present an efficient certificateless cryptography scheme and propose a protocol which provides the ability for sharing trust data securely. The protocol avoids the escrow problem identity-based cryptosystem and the secure delivery of private keys. The security of scheme is based on some underlying problems closely rel...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing

On the basis of comprehensive study of trusted computing technology and the threats to 3G network, the architecture of trusted mobile platform based on mobile trusted module is proposed, and a DAA-based key management and a trusted computing based access mechanism for 3G network are designed. Furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011