Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 4 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. A New Improved Algorithm for Secure Outsourcing of Modular Exponentiations | |||
Ye Jun, Chen Xiaofeng, Ma Jianfeng | |||
Computer Science and Technology 30 December 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Outsourcing computation allows for outsourced function evaluation from a resource-constrained client to a powerful server which may be not honest. The client invests some off-line computations to obtain a transformation of its function which is then passed to the server, who returns the result of the computation. In this paper we propose an outsourcing algorithm of modular exponentiations. In the computation process, the sensitive information during the modular exponentiation computation is hidden to the server, while the computation results can be efficiently verified by the client. | |||
TO cite this article:Ye Jun, Chen Xiaofeng, Ma Jianfeng. A New Improved Algorithm for Secure Outsourcing of Modular Exponentiations[OL].[30 December 2014] http://en.paper.edu.cn/en_releasepaper/content/4626109 |
2. On the Security of a Robust Certified Email System Based on Server-Supported Signature | |||
GUO Lifeng | |||
Computer Science and Technology 16 December 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Certified E-mail is a value-added service for standard e-mail systems, which allows a sender to deliver a message to a receiver in a fair way in the sense that either the sender gets a receipt from the receiver and the receiver accesses the content of the e-mail simultaneously, or neither party obtains the expected item. In ICICS'03, Yang et al. proposed a new certified e-mail system which alleviates computational overhead of mobile devices with limited computing power by server-supported signatures scheme. They claimed their scheme is fault-tolerant and robust against mobile adversary and conspiracy attacks. In this paper, we analyze their scheme and successfully identify several security flaws. Their scheme is vulnerable to conspiracy attacks by the sender colluding with a delegate. | |||
TO cite this article:GUO Lifeng. On the Security of a Robust Certified Email System Based on Server-Supported Signature[OL].[16 December 2013] http://en.paper.edu.cn/en_releasepaper/content/4574522 |
3. MD5 Calculation and Decryption Using CUDA on GPU | |||
LEI Mingshan,JIANG Yanjun,GAO Zhanchun | |||
Computer Science and Technology 04 December 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:It is difficult to get the original information from a MD5 hash since MD5 is a one-way hash algorithm. MD5 decryption is based on MD5 calculation for brute force attack, which requires great computing resources. This paper presents an approach for MD5 calculation and decryption on GPU, which has high concurrency. The CUDA program performed on a PC with NVIDIA GTX 560TI graphics card. The experimental result has shown that the calculating speed is 150 million words per second, increasing from 10 to 20 times compared to program run on CPU (Core i7-950 @3.07GHz). GPU has great potential in future general-purpose computing and concurrent computing. | |||
TO cite this article:LEI Mingshan,JIANG Yanjun,GAO Zhanchun. MD5 Calculation and Decryption Using CUDA on GPU[OL].[ 4 December 2013] http://en.paper.edu.cn/en_releasepaper/content/4573112 |
4. Research on security of e-payment in e-commerce | |||
DENG Guo-Xu,WANG Zhi-Qian | |||
Computer Science and Technology 24 September 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Electronic payment is a critical technology to ensure the normal running of electronic commerce. E-payment can work on Internet, mobile phone and PSTN. They achieve security mainly through SSL and SET. However, the detailed implementations are different. This paper researches the secure schemes of them and seeks a proper way to ensure the security of e-payment on PSTN network on which there is not even an operative method. | |||
TO cite this article:DENG Guo-Xu,WANG Zhi-Qian. Research on security of e-payment in e-commerce [OL].[24 September 2008] http://en.paper.edu.cn/en_releasepaper/content/24319 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated