Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Topology modeling algorithm for weighted directed network based on triad formation rule
YUAN Wen-ju LI Fei-peng SUN Xin FU Feng LIU Yan-heng
Journal of Computer Applications    2011, 31 (03): 591-593.   DOI: 10.3724/SP.J.1087.2011.00591
Abstract1559)      PDF (439KB)(1199)       Save
Topology generation algorithm of weighted directed network based on the triad formation rule was proposed. The directed edges were added to the network using weight preferential attachment rule and triad formation rule; moreover, the weights of network edges were evolved dynamically to realize the asymmetric interaction among nodes. The simulation results show that, the network topology, which is generated by the modeling algorithm for weighted directed network topology based on the triad formation rule, is consistent with topology characteristics showed by topology structures in the real network environment. Meanwhile, it has good controllability of the clustering coefficient.
Related Articles | Metrics
VPN identity certification technology based on fingerprint identification
Yu-jie Hao Yin-fu Feng Pan Lai
Journal of Computer Applications   
Abstract1924)      PDF (478KB)(1286)       Save
This paper analyzed and compared the advantages and disadvantages of the existing identity certification schemes for VPN connection, and pointed out the advantages of using fingerprint information for VPN identity certification. An identity certification scheme for VPN connection based on fingerprint identification was proposed. The paper also analyzed the security of the scheme, and introduced the application effect in the practical project. The scheme can prevent middle attack, tampering and falsifying information. It has forward-security, and is of better security than the existing schemes.
Related Articles | Metrics