Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((Ai PENG[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Remote attestation mechanism of platform configuration based on dynamic Huffman tree
FU Dong-lai PENG Xin-guang CHEN Gou-xi YANG Qiu-xiang
Journal of Computer Applications 2012, 32 (
08
): 2275-2282. DOI:
10.3724/SP.J.1087.2012.02275
Abstract
(
1142
)
PDF
(900KB)(
401
)
Knowledge map
Save
In order to improve the efficiency of remote attestation for platform configuration, a method based on RAMT (Remote Attestation based on Merkle Hash Tree) was proposed which improved the approach to storing the Hash value of trusted entities by using a dynamic Huffman tree. And the relevant proof of verification efficiency was also given. From the point of view of data structures used for storing the integrity Hash value of the application software, the problems of the existing methods were analyzed. And detailed description about architecture, measurement and verification of RADHT (Remote Attestation based on a Dynamic Huffman Tree) was given. An example about integrity measurement algorithm was presented for the proposed mechanism. The ability in privacy protection and the efficiency of RADHT were discussed. Compared with RAMT, the probability of the integrity Hash value inquired and its update were considered. Results show the efficiency of the remote attestation is improved.
Reference
|
Related Articles
|
Metrics
Select
Optimized design for network-on-chip router
WANG Jian LI Yu-bai PENG Qi-cong
Journal of Computer Applications 2011, 31 (
03
): 617-620. DOI:
10.3724/SP.J.1087.2011.00617
Abstract
(
1704
)
PDF
(649KB)(
1062
)
Knowledge map
Save
For the Network-on-Chip (NoC) with virtual-output-queue router architecture, a design method to customize the buffer size for each virtual channel was proposed, so that the NoC communication performance was improved. With the restriction of limited buffer resources that could be used in NoC, the effect of virtual channel buffer size on the average packet latency in NoC was analyzed, and then a buffer allocation algorithm was proposed and buffer resources were allocated to the bottleneck of NoC. It thus improved the NoC performance without additional buffer resources cost. Finally, the effectiveness of the optimization design method was validated by simulation and the performance of NoC with optimized router was compared with the performance of NoC with un-optimized router.
Related Articles
|
Metrics
Select
Model and analysis of LEACH protocol based on Petri net
Ai PENG Lan HUANG Zhong-Yi WANG Cheng WANG
Journal of Computer Applications
Abstract
(
1788
)
PDF
(1043KB)(
1096
)
Knowledge map
Save
Petri net is an effective mathematical tool for formally analyzing and verifying protocols. On the basis of the analysis of Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, a Generalized Stochastic Petri Nets (GSPN) model of performance for LEACH protocol was proposed. With the help of SPNP tools for analyzing the performance model of protocol, the validity of the model was verified. Finally, the significance of the performance model to the protocol's low-energy improvement was discussed.
Related Articles
|
Metrics