Supported by the National High Technology Research and Development Program of China (863 Program) (2007AA01Z404, 2007AA01Z478);the National Natural Science Foundation of China (60573141, 60773041);the Natural Science Foundation of Jiangsu Province (BK2008451)
To tackle trust asymmetry problem in grid authentication (GAu), this paper proposes a novel GAu mechanism to help establish a symmetric trust relationship between resource consumer and resource provider on the grid....
supported by the National Natural Science Foundation of China (60573141,60773041);National High Technology Research and Development Program of China (863 Program) (2006AA01Z439;2007AA01Z404; 2007AA01Z478);the Natural Science Foundation of Jiangsu Province (BK2008451);Science & Technology Project of Jiangsu Province (BE2009158);the Natural Science Foundation of Higher Education Institutions of Jiangsu Province (09KJB520010; 09KJB520009);the Research Fund for the Doctoral Program of Higher Education(2009 3223120001);the Sepcialized Research Fund of Ministry of Education (2009117);High Technology Research Program of Nanjing(2007RZ127);Foundation of National Laboratory for Modern Communications (9140C1105040805);Postdoctoral Foundation of Jiangsu Province (0801019C);Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province (CX08B-085Z;CX08B-086Z)
To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the ...
supported by the National Natural Science Foundation of China(No. 60573141, 60773041);National High Technology Research and Devel-opment Program of China(863 Program) (No. 2006AA01Z201, 2006AA01Z219, 2007AA01Z404, 2007AA01 Z478);the Provincial Jiangsu High Technology Research Program(No. BG2006001)
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a...
sponsored by the National Natural Science Foundation of China (60573141,60773041);the Hi-Tech Research and Development Program of China (2006AA01Z201,2006AA01Z439,2007AA01Z404, 2007AA01Z478);High Technology Research Program of Jiangsu Province (BG2006001);Foundation of National Laboratory for Modern Communications (9140C1105040805);Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (07KJB520083);Innovation Fund of Nanjing University of Posts and Telecommunications (NY208006)
Optorsim provides simulations of file replication strategies such as replica placement, replication scheduling, replica consistency maintenance, etc. However, to assess a replica strategy a researcher must write netwo...