Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some
malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit.
Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would
be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol
to address the issue where a conference key can be established among conferees even though malicious conferees exist. However,
his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a
fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce
a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction.
With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example
of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding
four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between
our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under
the situation where malicious conferees exist.
We propose performing space-variant optical logic operations in a space-invariant optical system by selectively assigning encoding states that are operation dependent. With this method, encoders using liquid-crystal cells and liquid-crystal light valves to perform space-variant encoding for all 16 Boolean functions are designed. Multiple-instruction-multiple-data processing can then be realized in optical logic systems. 相似文献
Organic redox-active materials are promising electrode candidates for lithium-ion batteries by virtue of their designable structure and cost-effectiveness. However, their poor electrical conductivity and high solubility in organic electrolytes limit the device's performance and practical applications. Herein, the π-conjugated nitrogen-containing heteroaromatic molecule hexaazatriphenylene (HATN) is strategically embedded with redox-active centers in the skeleton of a Cu-based 2D conductive metal–organic framework (2D c-MOF) to optimize the lithium (Li) storage performance of organic electrodes, which delivers improved specific capacity (763 mAh g−1 at 300 mA g−1), long-term cycling stability (≈90% capacity retention after 600 cycles at 300 mA g−1), and excellent rate performance. The correlation of experimental and computational results confirms that this high Li storage performance derives from the maximum number of active sites (CN sites in the HATN unit and CO sites in the CuO4 unit), favorable electrical conductivity, and efficient mass transfer channels. This strategy of integrating multiple redox-active moieties into the 2D c-MOF opens up a new avenue for the design of high-performance electrode materials. 相似文献
Li-rich layered oxides (LLOs) have been considered as the most promising cathode materials for achieving high energy density Li-ion batteries. However, they suffer from continuous voltage decay during cycling, which seriously shortens the lifespan of the battery in practical applications. This review comprehensively elaborates and summarizes the state-of-the-art of the research in this field. It is started from the proposed mechanism of voltage decay that refers to the phase transition, microscopic defects, and oxygen redox or release. Furthermore, several strategies to mitigate the voltage decay of LLOs from different scales, such as surface modification, elemental doping, regulation of components, control of defect, and morphology design are summarized. Finally, a systematic outlook on the real root of voltage decay is provided, and more importantly, a potential solution to voltage recovery from electrochemistry. Based on this progress, some effective strategies with multiple scales will be feasible to create the conditions for their commercialization in the future. 相似文献
The rumors, advertisements and malicious links are spread in social networks by social spammers, which affect users’ normal access to social networks and cause security problems. Most methods aim to detect social spammers by various features, such as content features, behavior features and relationship graph features, which rely on a large-scale labeled data. However, labeled data are lacking for training in real world, and manual annotating is time-consuming and labor-intensive. To solve this problem, we propose a novel method which combines active learning algorithm with co-training algorithm to make full use of unlabeled data. In co-training, user features are divided into two views without overlap. Classifiers are trained iteratively with labeled instances and the most confident unlabeled instances with pseudo-labels. In active learning, the most representative and uncertain instances are selected and annotated with real labels to extend labeled dataset. Experimental results on the Twitter and Apontador datasets show that our method can effectively detect social spammers in the case of limited labeled data.