Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 25 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Matrix Embedding Based on Trellis Structure of Linear Block Codes | |||
LIU Weiwei,LIU Guangjie | |||
Computer Science and Technology 14 March 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a general embedding framework based on syndrome BCJR trellis of binary linear block codes is proposed. It is constructed from the parity-check matrix and embedding message directly, the Viterbi algorithm can be implemented on this trellis to find the stego object which minimizes the embedding impact.The parity-check matrix can be constructed by the relative payload and it can work on arbitrary distortion profile. Finally, we give the experimental results for the proposed scheme with randomly constructed codes and typical linear block codes. | |||
TO cite this article:LIU Weiwei,LIU Guangjie. Matrix Embedding Based on Trellis Structure of Linear Block Codes[OL].[14 March 2013] http://en.paper.edu.cn/en_releasepaper/content/4527933 |
2. Secure Cloud Storage with Data De-duplication | |||
Wan Lei,Wang Chunlu,Liu Chuanyi | |||
Computer Science and Technology 15 June 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:reducing the amount of data need to be transferred, stored, and managed becomes a crucial for cloud storage. On the other hand, as user data are stored and processed by outsourced cloud provider, encryption becomes a necessary before updating data into the cloud. However, the above two goals are greatly opposed to each other. In order to solve the above conflict, a policy-based de-duplication proxy scheme is proposed in this paper. It suggests a policy-based de-duplication proxy scheme to enable different trust relations among cloud storage components, de-duplication related components and different security requirements. Further proposes a key management mechanism to access and decrypt the shared de-duplicated data chunks based on Proxy Re-encryption algorithms. This paper finally analyses the security of the scheme. | |||
TO cite this article:Wan Lei,Wang Chunlu,Liu Chuanyi. Secure Cloud Storage with Data De-duplication[OL].[15 June 2012] http://en.paper.edu.cn/en_releasepaper/content/4482237 |
3. Deniable Message Transmission Authenticator Based on Weak Signature Schemes | |||
TianHaibo | |||
Computer Science and Technology 10 April 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper shows how to use signature schemes for deniableauthentication. Deniable authentication means that a messagereceiver R, although received a message m from a sender S,cannot convince a third party that the sender S has sent R themessage m. Obviously, signature schemes secure againstexistential forgery are unsuitable for such a deniabilityproperty. However, if signature schemes are just secure againstselective forgery, we can construct a deniable authenticationprotocol. The protocol is presented in the extension framework ofRaimondo et al. as a deniable message transmission (MT)authenticator. | |||
TO cite this article:TianHaibo. Deniable Message Transmission Authenticator Based on Weak Signature Schemes[OL].[10 April 2012] http://en.paper.edu.cn/en_releasepaper/content/4474877 |
4. Adaptive window method for multi-scalar multiplication under resource-constrained environments | |||
Da-Zhi Sun | |||
Computer Science and Technology 04 January 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A basic but expensive operation in implementations of several famous public-key cryptosystems is the computation of the multi-scalar multiplication in a certain finite additive group defined by an elliptic curve. In this paper, we propose an adaptive window method for the multi-scalar multiplication, which can balance the computation cost and the memory cost under the resource-constrained environments. By modeling the scanning process as a Markov chain, we analyze the computational efficiency of this adaptive window method using the non-adjacent form (NAF) representation. When there are 2-4 extra registers, the adaptive window method using the NAF representation on average requires 11%-19% fewer additions than the Shamir trick using the joint sparse form (JSF) representation. In order to reduce the number of required registers, our strategy in the adaptive window method is not to store all values of the possible block pairs in the certain representations of two integers, but only to store those values with high probabilities. | |||
TO cite this article:Da-Zhi Sun. Adaptive window method for multi-scalar multiplication under resource-constrained environments[OL].[ 4 January 2012] http://en.paper.edu.cn/en_releasepaper/content/4458858 |
5. Joint Error Linear Complexity of pn-Periodic Multisequences Over Fp | |||
Ming Su | |||
Computer Science and Technology 29 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Recent developments in stream ciphers point towards aninterest in vectorized stream ciphers. According to the definitionof the joint linear complexity of multisequence, we extend it to thejoint error linear complexity of multisequence to study thestability of multisequences. We investigate the counting functionsof the joint error linear complexity of t-multiple 2n and pn-periodic multisequences with a few term errors in each singlesequence. Moreover, we propose efficient algorithms for computingthe joint error linear complexity of these kinds of multisequences,as well as the algorithms for determining all the error vectors thatgive the joint error linear complexity. Being familiar with thedistribution and having the efficient algorithms for computing thejoint error linear complexity, we can choose the parameters of t -multiple multisequence of these kinds of multisequences forlarge joint error linear complexity purpose. | |||
TO cite this article:Ming Su. Joint Error Linear Complexity of pn-Periodic Multisequences Over Fp[OL].[29 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4452389 |
6. A new strong multiple designated verifiers signature for broadcast propagation | |||
Tian Haibo | |||
Computer Science and Technology 21 August 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A strong multiple designated verifiers signature (SMDVS) enables a signer to convince a set ofverifiers by generating one signature, of which the verification needs the private key of averifier. After a brief survey of the current SMDVS schemes, there are noschemes suitable to the broadcast propagation, where the simulation needs only one verifier's private key.Motivated by this discovery, this paper proposes a broadcast SMDVS scheme.The new scheme is proven secure in the random oracle model. | |||
TO cite this article:Tian Haibo. A new strong multiple designated verifiers signature for broadcast propagation[OL].[21 August 2011] http://en.paper.edu.cn/en_releasepaper/content/4439843 |
7. Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks | |||
Luo Jiaqing,Xiao Bin,Zhou Shijie | |||
Computer Science and Technology 05 January 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection in P2P networks. Previous work only focuses on topological worm propagation where worms search a hosts neighbor-list to find new victims. In BitTorrent (BT) networks, the information from servers or trackers, however, could be fully exploited to design effective worms. In this paper, we propose a new approach for worm propagation in BT-like P2P networks. The worm, called Dynamic Hit-List (DHL) worm, locates new victims and propagates itself by requesting a tracker to build a dynamic hit list, which is a self-stopping BT worm to be stealthy. We construct an analytical model to study the propagation of such a worm: breadth-first propagation and depth-first propagation. The analytical results provide insights of the worm design into choosing parameters that enable the worm to stop itself after compromising a large fraction of vulnerable peers in a P2P network. We finally evaluate the performance of DHL worm through simulations. The simulation results verify the correctness of our model and show the effectiveness of the worm by comparing it with the topological worm. | |||
TO cite this article:Luo Jiaqing,Xiao Bin,Zhou Shijie. Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks[OL].[ 5 January 2011] http://en.paper.edu.cn/en_releasepaper/content/4403654 |
8. Analyzing Security Issues in Peer-to-Peer Networks with Threat Modeling | |||
Li Sai | |||
Computer Science and Technology 15 November 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The increasing use of Peer-to-Peer (P2P) Networks has brought its security issues under the scrutiny of the public eyes and under the close observation of the malicious users. Since the P2P communication model differs from that of conventional server and client system, P2P Networks meet more threats than traditional networks. However, there is the lack of a comprehensive process to designing P2P Networks protection solutions. In this paper, we discuss the Threat Modeling Process for analyzing security issues in P2P Networks, which aims at organizing system threats and vulnerabilities into general classes to be addressed with known protection techniques. Although there has been prior work on threat modeling primarily for software applications, to our knowledge this is the first attempt at threat modeling for P2P Networks. We summarize protection challenges unique to P2P Networks and propose a process to creating a threat model for P2P Networks, which based on the following security principles: Confidentiality, Integrity, Availability, Authentication, Anonymity, and Trust (CIAAAT). We hope this initial work will give some inspirations to P2P Network designers and start a discussion on how to better design and implement protection solutions for P2P Networks. | |||
TO cite this article:Li Sai. Analyzing Security Issues in Peer-to-Peer Networks with Threat Modeling[OL].[15 November 2010] http://en.paper.edu.cn/en_releasepaper/content/4391680 |
9. applications of proxy re-encryption in multi-decryptor encryption environments | |||
Wang Hongbing,Cao Zhenfu | |||
Computer Science and Technology 01 April 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Among multi-user cryptography, multi-decrypter encryption shows its particular applications. In multi-decrypter encryption, a message encrypted under multiple decrypters can only be decrypted when all the decrypters cooperate. However, the decryption fails if one of these decrypters can not access to the Internet. In this letter, we propose a simple method to ensure the decryption be successful when some of these decrypters are not online by using proxy re-encrypton. Considering the typical appliction of multi-decrypter encryption, our method seems more valuable. | |||
TO cite this article:Wang Hongbing,Cao Zhenfu. applications of proxy re-encryption in multi-decryptor encryption environments[OL].[ 1 April 2010] http://en.paper.edu.cn/en_releasepaper/content/41455 |
10. Centroid-based semi-fragile audio watermarking in hybrid domain | |||
Hong-Xia Wang,Ming-Quan Fan | |||
Computer Science and Technology 31 December 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Most of the previous (semi-) fragile audio watermarking schemes adopted binary image as watermark, which might reduce the security of watermarking systems. Moreover, the applicability of content or feature-based second generation digital watermarking is limited, and partial feature points may be damaged under watermarking operations and various common signal processing. Aiming at these problems, a novel centroid-based semi-fragile audio watermarking scheme in hybrid domain is proposed in this paper. The theoretical lower limit of signal to noise ratio (SNR) used to objectively evaluate the imperceptibility of watermarked audio signal is deduced and given. In addition, the watermark embedding capacity and the ability of tamper detection are also theoretically analyzed. Initially, the centroid of each audio frame is computed, and Hash function is performed on the obtained centroid in order to get the watermark. Finally, the audio sub-band which carries centroid of audio frame is performed with discrete wavelet transform (DWT) and discrete Cosine transform (DCT), and the encrypted watermark bits are embedded into the hybrid domain. Theoretical analysis and experimental results show that the proposed scheme is inaudible and suitable to different kinds of audio. Furthermore, the ability of tamper detection and tolerance against common signal processing operations are all excellent. Comparison with the existing schemes, the proposed scheme can not only resolve the issue of the veracity and integrity of audio content authentication effectively, but also popularize the applicability of content -based audio watermarking scheme. | |||
TO cite this article:Hong-Xia Wang,Ming-Quan Fan. Centroid-based semi-fragile audio watermarking in hybrid domain[OL].[31 December 2009] http://en.paper.edu.cn/en_releasepaper/content/38354 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated