Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 76 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Sinkhole Attack Detection in Clustered-based Self-organizing Networks | |||
Zhang Fangjiao,ZHAI Lidong | |||
Computer Science and Technology 09 December 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Self-organizing networks has vast applied foreground in the future because of its low-cost, save-power, and easy implementation etc. But in such many applications, some of them place high demands on it. And safety becomes critical for wide application. Sinkhole attack is a common attack, which easily is combined with other attacks to cause more damage. In this paper, a method to detect the sinkhole attack is proposed. Two arguments are raised to help detect the nodes suffering from sinkhole attack, Credit Rating and Flow difference. | |||
TO cite this article:Zhang Fangjiao,ZHAI Lidong. Sinkhole Attack Detection in Clustered-based Self-organizing Networks[OL].[ 9 December 2013] http://en.paper.edu.cn/en_releasepaper/content/4573922 |
2. Timed Release Program Obfuscation | |||
CHENG Rong ,ZHANG Fangguo | |||
Computer Science and Technology 06 December 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Program obfuscation is a compiler that transfers the original program into an unintelligible form while preserving the functionality. It has practical applications such as software protection and digital watermarking and meaningful promotion in cryptography theory field. Secure obfuscation for several particular function families have been raised out in despite of the general impossibility result presented by Barak $et$ $al.$. All the existing results are proved under the security requirement of virtual black-box property. In this paper, we introduce the timed release primitive into the program obfuscation, which results in a new model - timed release obfuscation. It has the new property that the virtual black-box property will not be preserved after a given time period. The timed release property has practical usefulness in cryptographical field. The formal model of timed release obfuscation is given and we also construct a detailed function which satisfies this model. | |||
TO cite this article:CHENG Rong ,ZHANG Fangguo. Timed Release Program Obfuscation[OL].[ 6 December 2013] http://en.paper.edu.cn/en_releasepaper/content/4571371 |
3. MD5 Calculation and Decryption Using CUDA on GPU | |||
LEI Mingshan,JIANG Yanjun,GAO Zhanchun | |||
Computer Science and Technology 04 December 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:It is difficult to get the original information from a MD5 hash since MD5 is a one-way hash algorithm. MD5 decryption is based on MD5 calculation for brute force attack, which requires great computing resources. This paper presents an approach for MD5 calculation and decryption on GPU, which has high concurrency. The CUDA program performed on a PC with NVIDIA GTX 560TI graphics card. The experimental result has shown that the calculating speed is 150 million words per second, increasing from 10 to 20 times compared to program run on CPU (Core i7-950 @3.07GHz). GPU has great potential in future general-purpose computing and concurrent computing. | |||
TO cite this article:LEI Mingshan,JIANG Yanjun,GAO Zhanchun. MD5 Calculation and Decryption Using CUDA on GPU[OL].[ 4 December 2013] http://en.paper.edu.cn/en_releasepaper/content/4573112 |
4. Research and Implementation based on RBAC role-based access model-based permissions system | |||
Liang Yongchao,Liu Peizhi | |||
Computer Science and Technology 29 September 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:RBAC (Role-Based Access Control, RBAC) role-based access technology is the study of R & D results funded by the U.S. Department of Defense (Department of Defense, DoD)-. The initial research is proposed in order to prevent system-specific confidential information from unauthorized access, recent policy is applied to these applications as a commercial field.This model of system permission control contribute to better use of resources in the system and maintain system security. | |||
TO cite this article:Liang Yongchao,Liu Peizhi. Research and Implementation based on RBAC role-based access model-based permissions system[OL].[29 September 2013] http://en.paper.edu.cn/en_releasepaper/content/4561673 |
5. A new construction of proxy signature using chameleon hash function | |||
Li Yannan,Ni Jianbing,Yu Yong | |||
Computer Science and Technology 09 September 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of proxy signature, in which the proxy signing is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption.Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrate that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide. | |||
TO cite this article:Li Yannan,Ni Jianbing,Yu Yong. A new construction of proxy signature using chameleon hash function[OL].[ 9 September 2013] http://en.paper.edu.cn/en_releasepaper/content/4559136 |
6. Generalized Format-preserving Encryption for Character Data | |||
Ma Haoyu,Liu Zheli,Jia Chunfu,Yuan Ke | |||
Computer Science and Technology 04 May 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We studied format-preserving encryption (FPE) for character data, for solutions that encipher character strings while preserving both their lengths and memory consumptions. By clustering characters into multiple sets according to the number of bytes they are encoded, we managed to establish mixed-radix numeral systems for character data. Under such systems, we proposed a basic method for character data that exploits existing FPEs, as well as a generalized character FPE scheme using Feistel-based construction, where a customized ``dynamic modular addition'' is used to ensure the feasibility the scheme. Our work showed a new way of designing encryption methods for arbitrary message spaces, which involves no tradeoff between efficacy and efficiency. | |||
TO cite this article:Ma Haoyu,Liu Zheli,Jia Chunfu, et al. Generalized Format-preserving Encryption for Character Data[OL].[ 4 May 2013] http://en.paper.edu.cn/en_releasepaper/content/4540303 |
7. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware | |||
Fu Jianming,Ding Shuang,Peng Bichen | |||
Computer Science and Technology 13 April 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In the open environment such as Internet, end-user host or machine is easily compromised and infected malicious code or malware due to vulnerabilities or user's mindlessness. This infection procedure may include a bootstrap to plant and load malware. Some researchers focus on detection this bootstrap, which locates at stack or heap, and others may concentrate on the detection malware at planting stage according to predefined patterns or signatures. The former detection depends on the structure and semantics of bootstrap, and may be intractable because code and data may be mixed in an input of normal program. Moreover, the later detection has the limitation to handle unknown malware. We analyze the attack steps of malware, and focus on the malware loading. Our assumption is that a malware contains no less than one module, so monitoring module loading is indispensable to defeat malware. Moreover, we design security policies, and employ these policies when a module is loaded by operating system. These policies depend on properties of module, the connection to created modules, and the link to user intention. The properties of module and this connection can improve the accuracy of malware detection. User intention can be helpful to handle unknown module, and enhances the flexibility of policy. Finally, ModuleGuard, a gatekeeper for dynamic module loading against malware, has been designed and implemented, which is integrated these security policies. Our experimental results have shown the feasibility and effectiveness of our method. | |||
TO cite this article:Fu Jianming,Ding Shuang,Peng Bichen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware[OL].[13 April 2013] http://en.paper.edu.cn/en_releasepaper/content/4537813 |
8. RESEARCH OF LOSSLESS DIGITAL WATERMARKING TECHNOLOGY | |||
Sun Jianguo,KOU Liang,XIA Songzhu | |||
Computer Science and Technology 14 March 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The digital map is an important and indispensable resource to the national strategic security and social economic development. At the present, needs to focus on resolving the utility question of digital vector map copyright protection technology, furthermore, the information hiding technology is the basic content of the research areas of the digital vector maps copyright protection. It is proposed a digital copyright protection scheme, based on the principle of unauthorized cannot resume, copyright embedding operation selection partly transform for the map content. Processing area determined by the spatial clustering analysis method that is based on grid density. | |||
TO cite this article:Sun Jianguo,KOU Liang,XIA Songzhu. RESEARCH OF LOSSLESS DIGITAL WATERMARKING TECHNOLOGY[OL].[14 March 2013] http://en.paper.edu.cn/en_releasepaper/content/4526746 |
9. Matrix Embedding Based on Trellis Structure of Linear Block Codes | |||
LIU Weiwei,LIU Guangjie | |||
Computer Science and Technology 14 March 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a general embedding framework based on syndrome BCJR trellis of binary linear block codes is proposed. It is constructed from the parity-check matrix and embedding message directly, the Viterbi algorithm can be implemented on this trellis to find the stego object which minimizes the embedding impact.The parity-check matrix can be constructed by the relative payload and it can work on arbitrary distortion profile. Finally, we give the experimental results for the proposed scheme with randomly constructed codes and typical linear block codes. | |||
TO cite this article:LIU Weiwei,LIU Guangjie. Matrix Embedding Based on Trellis Structure of Linear Block Codes[OL].[14 March 2013] http://en.paper.edu.cn/en_releasepaper/content/4527933 |
10. Reexamination of the security of arbitrated quantum signatures | |||
ZHANG Ke-Jia, WEN Qiao-Yan, QIN Su-Juan | |||
Computer Science and Technology 04 February 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:As a new model for signing both quantum and classical messages, the arbitrated quantum signature (AQS) protocols have recently attracted alot of attentions. In this paper, we analyze their security by discussing the receiver's forgery of the signature. Different from the previous analysis,we summarize an explicit formalization of the present AQS protocols and propose the necessary and sufficient conditions against the receiver's forgeryattack. Based on the conditions, it can be verified that the attempt to design an improved optimal encryption by modifying the encryption operators isuseless to prevent the receiver's forgery of the signature. Moreover, we study the security of AQS signed for classical messages, and find it is stillsusceptible to the receiver's forgery. Finally, we provide some assistant security strategies to recover the security and discuss several potentialsecurity problems of AQS in the further research. | |||
TO cite this article:ZHANG Ke-Jia, WEN Qiao-Yan, QIN Su-Juan. Reexamination of the security of arbitrated quantum signatures[OL].[ 4 February 2013] http://en.paper.edu.cn/en_releasepaper/content/4519594 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated