Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 77 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Joint Error Linear Complexity of pn-Periodic Multisequences Over Fp | |||
Ming Su | |||
Computer Science and Technology 29 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Recent developments in stream ciphers point towards aninterest in vectorized stream ciphers. According to the definitionof the joint linear complexity of multisequence, we extend it to thejoint error linear complexity of multisequence to study thestability of multisequences. We investigate the counting functionsof the joint error linear complexity of t-multiple 2n and pn-periodic multisequences with a few term errors in each singlesequence. Moreover, we propose efficient algorithms for computingthe joint error linear complexity of these kinds of multisequences,as well as the algorithms for determining all the error vectors thatgive the joint error linear complexity. Being familiar with thedistribution and having the efficient algorithms for computing thejoint error linear complexity, we can choose the parameters of t -multiple multisequence of these kinds of multisequences forlarge joint error linear complexity purpose. | |||
TO cite this article:Ming Su. Joint Error Linear Complexity of pn-Periodic Multisequences Over Fp[OL].[29 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4452389 |
2. Analyze the security of REESSE1+ Public Key Cryptosystem | |||
Gu Haihua,Gu Dawu,Xie Wenlu | |||
Computer Science and Technology 01 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In 2006, Shenghua Su design a public keycryptosystem named REESSE1+. In ChinaCrypt'10, Shenghua Su offered areward to encourage more people to analyze the security of REESSE1+ public key cryptosystem.We study the first challenge problem, and present an algorithm which can extract the private key definitely from the public key in subexponential time. | |||
TO cite this article:Gu Haihua,Gu Dawu,Xie Wenlu. Analyze the security of REESSE1+ Public Key Cryptosystem[OL].[ 1 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4447639 |
3. Refinement of Miller's Algorithm over Huff Curves | |||
Gu Haihua,Gu Dawu ,Xie Wenlu | |||
Computer Science and Technology 28 October 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Pairings on elliptic curvesare currently of great interest due to their applications in anumber of cryptographic protocols such as identity-based encryption,group signatures, short signatures and the tripartite Diffie Hellman. The Miller's algorithm is the most commonly used method of computing pairing. Denominator elimination can improve the Miller's algorithm when the embedding degree with the form 2i3j. However, if the embedding degree don't have the above form, how to speed up the Miller's algorithm This work gives a refinement to Miller's algorithm over Huff curves. It is about 20.38% faster than the original Miller's algorithm over Huff curves. | |||
TO cite this article:Gu Haihua,Gu Dawu ,Xie Wenlu. Refinement of Miller's Algorithm over Huff Curves[OL].[28 October 2011] http://en.paper.edu.cn/en_releasepaper/content/4447520 |
4. A new strong multiple designated verifiers signature for broadcast propagation | |||
Tian Haibo | |||
Computer Science and Technology 21 August 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A strong multiple designated verifiers signature (SMDVS) enables a signer to convince a set ofverifiers by generating one signature, of which the verification needs the private key of averifier. After a brief survey of the current SMDVS schemes, there are noschemes suitable to the broadcast propagation, where the simulation needs only one verifier's private key.Motivated by this discovery, this paper proposes a broadcast SMDVS scheme.The new scheme is proven secure in the random oracle model. | |||
TO cite this article:Tian Haibo. A new strong multiple designated verifiers signature for broadcast propagation[OL].[21 August 2011] http://en.paper.edu.cn/en_releasepaper/content/4439843 |
5. Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks | |||
Luo Jiaqing,Xiao Bin,Zhou Shijie | |||
Computer Science and Technology 05 January 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection in P2P networks. Previous work only focuses on topological worm propagation where worms search a hosts neighbor-list to find new victims. In BitTorrent (BT) networks, the information from servers or trackers, however, could be fully exploited to design effective worms. In this paper, we propose a new approach for worm propagation in BT-like P2P networks. The worm, called Dynamic Hit-List (DHL) worm, locates new victims and propagates itself by requesting a tracker to build a dynamic hit list, which is a self-stopping BT worm to be stealthy. We construct an analytical model to study the propagation of such a worm: breadth-first propagation and depth-first propagation. The analytical results provide insights of the worm design into choosing parameters that enable the worm to stop itself after compromising a large fraction of vulnerable peers in a P2P network. We finally evaluate the performance of DHL worm through simulations. The simulation results verify the correctness of our model and show the effectiveness of the worm by comparing it with the topological worm. | |||
TO cite this article:Luo Jiaqing,Xiao Bin,Zhou Shijie. Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks[OL].[ 5 January 2011] http://en.paper.edu.cn/en_releasepaper/content/4403654 |
6. Analyzing Security Issues in Peer-to-Peer Networks with Threat Modeling | |||
Li Sai | |||
Computer Science and Technology 15 November 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The increasing use of Peer-to-Peer (P2P) Networks has brought its security issues under the scrutiny of the public eyes and under the close observation of the malicious users. Since the P2P communication model differs from that of conventional server and client system, P2P Networks meet more threats than traditional networks. However, there is the lack of a comprehensive process to designing P2P Networks protection solutions. In this paper, we discuss the Threat Modeling Process for analyzing security issues in P2P Networks, which aims at organizing system threats and vulnerabilities into general classes to be addressed with known protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at threat modeling for P2P Networks. We summarize protection challenges unique to P2P Networks and propose a process to creating a threat model for P2P Networks, which based on the following security principles: Confidentiality, Integrity, Availability, Authentication, Anonymity, and Trust (CIAAAT). We hope this initial work will give some inspirations to P2P Network designers and start a discussion on how to better design and implement protection solutions for P2P Networks. | |||
TO cite this article:Li Sai. Analyzing Security Issues in Peer-to-Peer Networks with Threat Modeling[OL].[15 November 2010] http://en.paper.edu.cn/en_releasepaper/content/4391680 |
7. Some Basic Principles for Proxy Signature Schemes Based on DLP | |||
Xue Qingshui ,Li Fengying,Cao Zhenfu | |||
Computer Science and Technology 06 April 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Nowadays, most proxy signature schemes are based on the difficulty of DLP (Discrete Logarithm Problem) or ECDLP (Elliptical Curve Discrete Logarithm Problem). As though many proxy signature schemes based on DLP or ECDLP have been proposed, it makes us discouraged that some disadvantages can be found after a new or modified proxy signature scheme was designed after short time. How to solve the question? How to design secure and valid proxy signature schemes? How to prove them secure? Now, it is too difficult for us to prove one scheme secure, but if we can have some principles to conform to when designing some proxy signature schemes based on DLP or ECDLP, it will be helpful. It will be able to make scheme designers to make few mistakes, that’s to say, by these principles, they can judge whether their schemes meet these basic secure conditions or not. If designers don’t abide by these principles, it can easily be seen that their schemes are definitely insecure. It is all known that until now there are no such principles in the real life. The first principle is that the existent forms of public parameters in proxy signatures in the proxy signature verification congruence make a key role on the security property of unforgeability; the second principle is that any public parameter in the proxy signature can’t lonely exist in the proxy signature verification congruence in the form of bases or exponents; the third principle is that any public parameter in the proxy signature should exist in the proxy signature verification equation in the form of not only exponents and bases, but also hashes. About these principles, they are described. In addition, some examples are made to make them clear. | |||
TO cite this article:Xue Qingshui ,Li Fengying,Cao Zhenfu . Some Basic Principles for Proxy Signature Schemes Based on DLP[OL].[ 6 April 2010] http://en.paper.edu.cn/en_releasepaper/content/41553 |
8. applications of proxy re-encryption in multi-decryptor encryption environments | |||
Wang Hongbing,Cao Zhenfu | |||
Computer Science and Technology 01 April 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Among multi-user cryptography, multi-decrypter encryption shows its particular applications. In multi-decrypter encryption, a message encrypted under multiple decrypters can only be decrypted when all the decrypters cooperate. However, the decryption fails if one of these decrypters can not access to the Internet. In this letter, we propose a simple method to ensure the decryption be successful when some of these decrypters are not online by using proxy re-encrypton. Considering the typical appliction of multi-decrypter encryption, our method seems more valuable. | |||
TO cite this article:Wang Hongbing,Cao Zhenfu. applications of proxy re-encryption in multi-decryptor encryption environments[OL].[ 1 April 2010] http://en.paper.edu.cn/en_releasepaper/content/41455 |
9. A trust management model based on reputation for virtual community | |||
Zhao Shuqin ,Guo Yucui,Lv Shang | |||
Computer Science and Technology 09 March 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A trust management model based on reputation and considered the activity degree and the length of the trust chain which can get a satisfactory trust value accuracy is proposed, to improve the accuracy of trust value among members in virtual community(VC). Superior to the existing approaches, more factors are taken into account and corresponding punishment mechanism is introduced, and the model can motivate members to participate in activities. Simulation shows that this model is effective and feasible to virtual communities. | |||
TO cite this article:Zhao Shuqin ,Guo Yucui,Lv Shang . A trust management model based on reputation for virtual community[OL].[ 9 March 2010] http://en.paper.edu.cn/en_releasepaper/content/40501 |
10. Centroid-based semi-fragile audio watermarking in hybrid domain | |||
Hong-Xia Wang,Ming-Quan Fan | |||
Computer Science and Technology 31 December 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Most of the previous (semi-) fragile audio watermarking schemes adopted binary image as watermark, which might reduce the security of watermarking systems. Moreover, the applicability of content or feature-based second generation digital watermarking is limited, and partial feature points may be damaged under watermarking operations and various common signal processing. Aiming at these problems, a novel centroid-based semi-fragile audio watermarking scheme in hybrid domain is proposed in this paper. The theoretical lower limit of signal to noise ratio (SNR) used to objectively evaluate the imperceptibility of watermarked audio signal is deduced and given. In addition, the watermark embedding capacity and the ability of tamper detection are also theoretically analyzed. Initially, the centroid of each audio frame is computed, and Hash function is performed on the obtained centroid in order to get the watermark. Finally, the audio sub-band which carries centroid of audio frame is performed with discrete wavelet transform (DWT) and discrete Cosine transform (DCT), and the encrypted watermark bits are embedded into the hybrid domain. Theoretical analysis and experimental results show that the proposed scheme is inaudible and suitable to different kinds of audio. Furthermore, the ability of tamper detection and tolerance against common signal processing operations are all excellent. Comparison with the existing schemes, the proposed scheme can not only resolve the issue of the veracity and integrity of audio content authentication effectively, but also popularize the applicability of content -based audio watermarking scheme. | |||
TO cite this article:Hong-Xia Wang,Ming-Quan Fan. Centroid-based semi-fragile audio watermarking in hybrid domain[OL].[31 December 2009] http://en.paper.edu.cn/en_releasepaper/content/38354 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated