The search functionality is under construction.

Author Search Result

[Author] Zhiqiang LI(6hit)

1-6hit
  • Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions

    Wenjuan LI  Weizhi MENG  Zhiqiang LIU  Man-Ho AU  

     
    INVITED PAPER

      Pubricized:
    2019/11/08
      Vol:
    E103-D No:2
      Page(s):
    196-203

    Software-Defined Networking (SDN) enables flexible deployment and innovation of new networking applications by decoupling and abstracting the control and data planes. It has radically changed the concept and way of building and managing networked systems, and reduced the barriers to entry for new players in the service markets. It is considered to be a promising solution providing the scale and versatility necessary for IoT. However, SDN may also face many challenges, i.e., the centralized control plane would be a single point of failure. With the advent of blockchain technology, blockchain-based SDN has become an emerging architecture for securing a distributed network environment. Motivated by this, in this work, we summarize the generic framework of blockchain-based SDN, discuss security challenges and relevant solutions, and provide insights on the future development in this field.

  • A Formal Model to Enforce Trustworthiness Requirements in Service Composition

    Ning FU  Yingfeng ZHANG  Lijun SHAN  Zhiqiang LIU  Han PENG  

     
    PAPER-Software System

      Pubricized:
    2017/06/20
      Vol:
    E100-D No:9
      Page(s):
    2056-2067

    With the in-depth development of service computing, it has become clear that when constructing service applications in an open dynamic network environment, greater attention must be paid to trustworthiness under the premise of functions' realization. Trustworthy computing requires theories for business process modeling in terms of both behavior and trustworthiness. In this paper, a calculus for ensuring the satisfaction of trustworthiness requirements in service-oriented systems is proposed. We investigate a calculus called QPi, for representing both the behavior and the trustworthiness property of concurrent systems. QPi is the combination of pi-calculus and a constraint semiring, which has a feature when problems with multi-dimensional properties must be tackled. The concept of the quantified bisimulation of processes provides us a measure of the degree of equivalence of processes based on the bisimulation distance. The QPi related properties of bisimulation and bisimilarity are also discussed. A specific modeling example is given to illustrate the effectiveness of the algebraic method.

  • Permutation Polynomials over Zpn and Their Randomness

    Yuyin YU  Lishan KE  Zhiqiang LIN  Qiuyan WANG  

     
    LETTER-Information Theory

      Vol:
    E100-A No:3
      Page(s):
    913-915

    Permutation polynomials over Zpn are useful in the design of cryptographic algorithms. In this paper, we obtain an equivalent condition for polynomial functions over Zpn to be permutations, and this equivalent condition can help us to analysis the randomness of such functions. Our results provide a method to distinguish permutation polynomials from random functions. We also introduce how to improve the randomness of permutation polynomials over Zpn.

  • On the LFSRization of a Class of FCSR Automata

    Zhiqiang LIN  Lishan KE  Dongdai LIN  Jian GAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:1
      Page(s):
    434-440

    Feedback with carry shift registers (FCSRs) implemented using Galois representation have been found to have a weakness called LFSRization. It leads to powerful attacks against the stream ciphers based on them. A new representation called ring representation has been proposed to avoid the attacks. It was considered to circumvent the weaknesses of Galois FCSRs. This correspondence presents a class of ring FCSRs, which meet the implementation criteria, but are still possible to maintain linear behavior for several clock cycles. Their LFSRization probability and how to improve their security are also mentioned.

  • Dynamic Power Allocation Based on Rain Attenuation Prediction for High Throughput Broadband Satellite Systems

    Shengchao SHI  Guangxia LI  Zhiqiang LI  Bin GAO  Zhangkai LUO  

     
    LETTER-Numerical Analysis and Optimization

      Vol:
    E100-A No:9
      Page(s):
    2038-2043

    Broadband satellites, operating at Ka band and above, are playing more and more important roles in future satellite networks. Meanwhile, rain attenuation is the dominant impairment in these bands. In this context, a dynamic power allocation scheme based on rain attenuation prediction is proposed. By this scheme, the system can dynamically adjust the allocated power according to the time-varying predicted rain attenuation. Extensive simulation results demonstrate the improvement of the dynamic scheme over the static allocation. It can be concluded that the allocated capacities match the traffic demands better by introducing such dynamic power allocation scheme and the waste of power resources is also avoided.

  • Color-to-Gray Conversion Method Considering Contrasts in Color Image

    Shi BAO  Zhiqiang LIU  Go TANAKA  

     
    LETTER-Image

      Vol:
    E101-A No:11
      Page(s):
    1849-1853

    A new projection-based color-to-gray conversion method is proposed in this letter. In the proposed method, an objective function which considers color contrasts in an input image is defined. Projection coefficients are determined by minimizing the objective function. Experimental results show the validity of the proposed method.