Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 5 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Analysis and design of secure email system | |||
SAMASSI Alassane,XIN Yang | |||
Computer Science and Technology 15 June 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper describes a secure email system especially how to design his personal email system by handling both symmetric-key and public-key techniques. The system consists of a mail server to manage the sending and receipt of the email, a data base to manage the certificates corresponding to different emails. A model is implemented to check the certificate from the certification authority then save it into the database, then another model implemented to encrypt the email by using first the symmetric-key with AES encryption then use the public key technique to encrypt the symmetric-key with RSA encryption technology before sending. A model is designed to sign the email with the sender's private key to minimize spam and others virus and threats, to be sure of the email source. With all its commands, the library OpenSSL will be a very important toolkit. As a result of the project on building automation, the tool interface used is the command line interface. All the sending email process must be transparent to the user, easily handy and especially reliable with all security precautions. | |||
TO cite this article:SAMASSI Alassane,XIN Yang. Analysis and design of secure email system[OL].[15 June 2015] http://en.paper.edu.cn/en_releasepaper/content/4643782 |
2. Research and Implementation based on RBAC role-based access model-based permissions system | |||
Liang Yongchao,Liu Peizhi | |||
Computer Science and Technology 29 September 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:RBAC (Role-Based Access Control, RBAC) role-based access technology is the study of R & D results funded by the U.S. Department of Defense (Department of Defense, DoD)-. The initial research is proposed in order to prevent system-specific confidential information from unauthorized access, recent policy is applied to these applications as a commercial field.This model of system permission control contribute to better use of resources in the system and maintain system security. | |||
TO cite this article:Liang Yongchao,Liu Peizhi. Research and Implementation based on RBAC role-based access model-based permissions system[OL].[29 September 2013] http://en.paper.edu.cn/en_releasepaper/content/4561673 |
3. Improved Rectangle Attack on SMS4 Reduced to 18 Rounds | |||
Kong Xianglong ,Wang Wei ,XU Qiuliang | |||
Computer Science and Technology 31 August 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:SMS4 is a 32-round block cipher with 128-bit block size and 128-bit secret key. It is used in WAPI, the Chinese WLAN national standard. This paper analyzes the security of SMS4 against the rectangle attack. First, this paper describes two properties of SMS4. Next, it proposes the 16-round rectangle distinguisher with probability 2^-250. Finally, the rectangle attack is then carried out on 18-round SMS4 with 2^127 chosen plaintexts and the time complexity is 2^103.83 18-round encryptions. In this process a hash table is used to reduce the time complexity. This attack is the best rectangle attack on SMS4 so far. | |||
TO cite this article:Kong Xianglong ,Wang Wei ,XU Qiuliang. Improved Rectangle Attack on SMS4 Reduced to 18 Rounds[OL].[31 August 2013] http://en.paper.edu.cn/en_releasepaper/content/4557323 |
4. RESEARCH ON CREDIBILITY TECHNOLOGY IN SERVICE ENGINEERING | |||
YANG ZhiFang,YU YanHua,ZHU ChaoPing,XIAO Shan | |||
Computer Science and Technology 13 December 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract: With the development of the Internet world, the service itself and the service environment are becoming more and more complex, service system which bases on service composition faces many new challenges, especially the security of services has become an important research problems. Typically, the service's credibility refer to the behavior and the result of the service are consistent with users' expectations, and its extension including availability, reliability, integrity, maintainability and survivability of service and so on. Intemet's attribute of openness, autonomy and free distribution of central control, heterogeneous and dynamic features of service system itself increase the difficulty of credibility. Relying solely on common services engineering method has been difficult to adapt to the credibility of security requirements.Therefore,we need apply related trusted computing technology to service engineering methodology,and security trust mechanisms should also be added, to dynamically protect the credibility of the service system. | |||
TO cite this article:YANG ZhiFang,YU YanHua,ZHU ChaoPing, et al. RESEARCH ON CREDIBILITY TECHNOLOGY IN SERVICE ENGINEERING[OL].[13 December 2011] http://en.paper.edu.cn/en_releasepaper/content/4455559 |
5. Reserch On An Efficient RSS Localization Algorithm Based On WIFI | |||
Wang He | |||
Computer Science and Technology 12 December 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The localization accuracy and calculating time is the key fact in the WIFI localization system for indoor environment. In this paper, a new method is proposed to improve the performance of WIFI localization system by design TDOA in RSS-map. This method simplifies the process of estimating the coordinate of the object in RSS-map; meanwhile it utilizes all measured values to improve the localization accuracy by chan algorithm. The better performance of the method is shown by the data collected in simulations with various conditions of communication. | |||
TO cite this article:Wang He. Reserch On An Efficient RSS Localization Algorithm Based On WIFI[OL].[12 December 2010] http://en.paper.edu.cn/en_releasepaper/content/4397164 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated