To address the problems existing in current college programming education, we consider that the cultivation of security coding ability may be combined within existing courses, such as programming courses, operating sy...
详细信息
ISBN:
(纸本)9781424435197
To address the problems existing in current college programming education, we consider that the cultivation of security coding ability may be combined within existing courses, such as programming courses, operating system and software engineering curriculum, etc. This paper reviews the authors' several-year practice of integrating the training of the students' security coding ability with programming courses. Three key stages of practice are introduced, which are organic combination with programming curricula, choosing proper textbooks and the introduction of security coding examples. The authors strive to achieve three improvements in the cultivation of students' ability: improvements from defensive programming to security programming, adding secure functions instead of security functions, and paying more attention to enhancing the software quality instead of security. The main contents of security software coding best practices integrated into our teaching practice are given. The testing result shows that the students' security coding ability can be improved, and in fact many of whom have performed well in job interview and get a good job.
security and error control coding are two crucial aspects of the digital communication systems. The deployment of data transmission systems easy to eavesdrop, such as wireless systems, makes strategic the protection o...
详细信息
ISBN:
(纸本)9781479930838
security and error control coding are two crucial aspects of the digital communication systems. The deployment of data transmission systems easy to eavesdrop, such as wireless systems, makes strategic the protection of the data secrecy. This paper presents an encryption scheme based on the dynamic observation of the reciprocal propagation channel between the legitimate nodes. A "session key", generated from the Complex Impulse Response (CIR) measurements, manages the channel coding system, namely a turbo-code. This scheme allows to jointly perform an error control and dynamic coding in only one step. This scheme allows a dynamic security coding without change of the hardware structure of the transceiver devices.
Secure network coding assumes that the underlying network channels are error-free;thus, if our channels introduce errors, we need to first apply a channel code to correct them, and then build security on top of the re...
详细信息
Secure network coding assumes that the underlying network channels are error-free;thus, if our channels introduce errors, we need to first apply a channel code to correct them, and then build security on top of the resulting error-free network. In this paper, we develop achievability protocols and outer bounds for the secure network coding setting, where the edges are subject to packet erasures, and public feedback of the channel state is available to both Eve and the legitimate network nodes. We show that by leveraging erasures and feedback, we can achieve secrecy rates that are in some cases multiple times higher than the alternative of separate channel-error-correction followed by secure network coding;moreover, we develop outer bounds and prove optimality of our proposed schemes in some special cases.
A laser-based security technique called Laser Surface Authentication (LSA) is described in which diffuse laser scattering is used as a probe of the naturally-occurring randomness present in virtually all surfaces. LSA...
详细信息
A laser-based security technique called Laser Surface Authentication (LSA) is described in which diffuse laser scattering is used as a probe of the naturally-occurring randomness present in virtually all surfaces. LSA brings the principles of biometric identification currently used in human fingerprint- or iris-recognition to the world of inanimate objects such as paper documents, plastic cards, high value branded products and a range of other things that are commonly counterfeited or smuggled.
This paper considers the problem of secure coding design for a type H wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless channel. Th...
详细信息
ISBN:
(纸本)9781424415632
This paper considers the problem of secure coding design for a type H wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless channel. The proposed secure error-correcting code has a nested code structure. Two secure nested coding schemes are studied for a type H Gaussian wiretap channel. The nesting is based on cosets of a good code sequence for the first scheme and on cosets of the dual of a good code sequence for the second scheme. In each case, the corresponding achievable rate-equivocation pair is derived based on the threshold behavior of good code sequences. The two secure coding schemes together establish an achievable rate-equivocation region, which almost covers the secrecy capacity-equivocation region in this case study. The proposed secure coding scheme is extended to a type II binary symmetric wiretap channel. A new achievable perfect secrecy rate, which improves upon the previously reported result by Thangaraj et al., is derived for this channel.
The Gd2MgTiO6 is an infant luminescence host that portrays eclectic applications in displays, security devices, and forensic studies. The perovskites are synthesized by facile combustion method, decreasing the synthes...
详细信息
The Gd2MgTiO6 is an infant luminescence host that portrays eclectic applications in displays, security devices, and forensic studies. The perovskites are synthesized by facile combustion method, decreasing the synthesis conditions from 1573 K, 5 h to 1173 K, 4 h, from conventional routes. The phosphors are then activated with Dy3+ ions, giving photoluminescence emission in the blue, yellow, and red regions of the visible spectrum owing to (4F9/2 -> 6H15/2), (4F9/2 -> 6H13/2), and (4F9/2 -> 6H11/2) transitions respectively. Further, monovalent Li+, divalent Sr2+, or trivalent Sm3+ ions are co-doped in the crystal matrix, which chiefly enhances the optical and crystalline properties for Li+ sensitization. Under 351 nm excitation, these samples show CIE coordinates (0.3290, 0.3313), color temperature 5759 K, color rendering index 86, and color purity of 2.5 %;signifying ideal white light emission for wLED with quantum efficiency 43 %. Under 980 nm excitation, these phosphors gave noble red emission, which can be effectually applied as a level 3 latent fingerprint visualization tool in criminology. The white and red emissions on UV and NIR excitation respectively are combined for potent anticounterfeiting security ink and encryption coding;which marked a new methodology for the multifunctional application of a single phosphor matrix.
In this paper, we propose an improved algorithm on the design of degree distribution on the basis of the security coding system model of fountain code concatenation and coset precoding. The algorithm is an improved gl...
详细信息
ISBN:
(纸本)9781450387811
In this paper, we propose an improved algorithm on the design of degree distribution on the basis of the security coding system model of fountain code concatenation and coset precoding. The algorithm is an improved global optimization algorithm based on particle swarm optimization (PSO) and chaos mechanism which is suitable for memoryless binary erasure channel with noise in both main channel and eavesdropping channel. The simulation results show that the algorithm reduces the computational complexity of fountain code degree distribution and effectively improves the stability. The fountain code generated by the algorithm has better decoding burst speed and can meet the requirements of larger security region of the system.
This research work is based upon the new Microsoft DigiSpark outreach project initiated by the computer science (CS) program at the University of Wisconsin - Green Bay (UWGB) in an effort to engage K-12 female learner...
详细信息
ISBN:
(纸本)9781728108223
This research work is based upon the new Microsoft DigiSpark outreach project initiated by the computer science (CS) program at the University of Wisconsin - Green Bay (UWGB) in an effort to engage K-12 female learners in CS. It describes our unique experiential learning approach combining robotics and cybersecurity, which has been adopted in the outreach workshop sessions as part of our project. Our project involves the use of the NAO humanoid robots in order to successfully engage middle-school and high-school female students, who are underrepresented in CS. These outreach workshop sessions have exposed the young female participants to defensive computer programming, and computing security topics by providing them the hands-on opportunity to write secure code for programming the NAO, and to carry out an ethical hack on the NAO in order to explore robotic system vulnerabilities. Existing literature shows that there is limited work on the efficacy of teaching secure-coding and ethical-hacking related computer-security topics using a robotic-platform. Prior work indicate that a robotic-platform can be an effective and engaging medium for teaching computer-security. However, our proposed approach of teaching secure coding and ethical hacking through hands-on exercises with NAO is a first-of-its-kind experiment with female students at the K-12 level. As preliminary evidence of the effectiveness and potential of this novel approach, we discuss our preliminary experimental results, including initial participant interests and survey data, from the multiple NAO secure coding and NAO ethical hacking workshop sessions, which we have conducted with high-school and middle-school female learners.
暂无评论