With rapid growth of Online Social Networks (OSN), more and more users are attracted to share their personal information or even cooperate in business via OSN. Therefore, the issues of privacy and security in OSN beco...
详细信息
With rapid growth of Online Social Networks (OSN), more and more users are attracted to share their personal information or even cooperate in business via OSN. Therefore, the issues of privacy and security in OSN become more important than ever. In this paper, we address the issue of securely delivering message through OSN. A secure message delivery scheme based on profile images, called VisualSec, is proposed. One of the main differences between our scheme and existing schemes is that we utilize visual identifier, i.e., profile image which is common in OSN, as the public key. Furthermore, the proposed scheme does not depend on a single trusted authority (or multiple trusted authorities), instead, it is a fully distributed scheme exploiting social relationships formed by OSN to provide authentication and key generation services. With a profile image, one could encrypt and deliver messages which could only be decrypted by the user who is identical to that image. The implementation issues as well as the efficiency and security of VisualSec are discussed and evaluated in this paper. It is illustrated that the proposed scheme is a feasible and efficient solution for delivering message securely through OSN.
security, simplicity, efficiency, are three important aspects of system architecture design, especially for dedicated security systems. The legacy horizontal-layered architectures (e.g., microkernel model) suffer from...
详细信息
security, simplicity, efficiency, are three important aspects of system architecture design, especially for dedicated security systems. The legacy horizontal-layered architectures (e.g., microkernel model) suffer from lacking of many desired features, such as flexibility, security and deployability. In this paper, we propose a new kernel model with vertical architecture, called ultra-kernel model, to make kernel smaller and provide application programmers with direct hardware access. We show that this model has visible advantages over the microkernel architecture, among them, fault-code tolerance and application isolation. To test and evaluate our proposed model, we have implemented a prototype firewall system based on our ultra-kernel design in a developing environment. The ultra-kernel with message exchange contains only 870 lines of C/C++ source code. Measurements show that the performances of the prototype firewall is significantly improved, comparing with an optimized Linux system on the same hardware platform.
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into...
详细信息
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into gradient map, then smooth the map using the method of morphological opening and closing operators, last thresholding it. For discriminating the very small regions which are segmented as ROI, considering the luminance and saturation characteristics of color image, the homogeneity measure criteria was applied to merge them with their similar neighboring regions, then removed the background from the image . According to the experiment results, over-segmentation caused by watershed algorithm has been greatly improved, and this method is proved to be feasible and valid.
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the...
详细信息
ISBN:
(纸本)9781424442232
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the symbolic model checker for multiagent systems MCTK, which is developed by us, to the verification of security protocols. One temporal epistemic property is checked successfully both in the original version and the Lowe's revised version of the Needham-Schroeder protocol. The experimental result shows that our method is an effective way to the verification of security protocol.
A novel high-order spring-dashpot-mass model (SDMM) for convolution integral of force-displacement relationship in time domain is proposed and applied into the cylindrical-symmetry wave motions in infinite domain as a...
详细信息
A novel high-order spring-dashpot-mass model (SDMM) for convolution integral of force-displacement relationship in time domain is proposed and applied into the cylindrical-symmetry wave motions in infinite domain as an artificial boundary condition (ABC). First, the high-order SDMM is dynamically and numerically stable, while low- and high-frequency instabilities occur under the displacement-type ABCs in term of space-time extrapolation, such as multi-transmitting formula (MTF) and Pade boundary. Second, SDMM has higher numerical accuracy than the stress-type ABCs, such as viscous boundary (VB) and viscous-spring boundary (VSB). Third, SDMM is strictly doubly asymptotic at low- and high-frequency limits, and can be degenerated to VB or VSB. Fourth, SDMM can be incorporated simply and easily into commercial FE software by using the internal spring-dashpot and mass elements and time-integration solvers. Several numerical cases were carried out to validate the particular features of SDMM.
A rapidly changing environment forces the workflow management systems to change their workflow processes ever more frequently. In order to improve the flexibility of workflow management systems, a dynamic workflow mod...
详细信息
To make workflow processes more flexible, a dynamic generation approach tor workflow processes corresponding to an instance is presented in this study. An activity, a part of a workflow, is defined as an action based ...
详细信息
The electrical capacitance tomography (ECT) system was used to the visualization of the two-phase flow as well as the measurement of the film thickness in a pulsating heat pipe (PHP). The new-developed micro-sensor wa...
详细信息
The electrical capacitance tomography (ECT) system was used to the visualization of the two-phase flow as well as the measurement of the film thickness in a pulsating heat pipe (PHP). The new-developed micro-sensor was also applied as a part of the flow channel, with the characteristics of heat transfer and hydrodynamics similar to the measured tube. The measurement accuracy and the image resolving power were improved as compared with the conventional sensors. So the applied area of the ECT technology was widened. The experimental results indicate that there might exist three flow patterns, i.e. bubble-liquid slug flow, semi-annular flow and annular flow, corresponding to different operating conditions. The measurement results of the film thickness compare well with the actual conditions, and the trend of the film thickness can realize the identification of the flow patterns.
Many smart card based remote authentication schemes have been proposed to preserve user privacy against eavesdropper. However, none of the exiting scheme provides both users' anonymity to server and traceability t...
详细信息
Many smart card based remote authentication schemes have been proposed to preserve user privacy against eavesdropper. However, none of the exiting scheme provides both users' anonymity to server and traceability to the malicious user. In this paper, we present a scheme that preserve user anonymity not only against outside attackers, but also against the remote server. When a malicious user was found, server can trace the user with the help of the trusted third party.
DNA computing is a bio-computing paradigm based on the specific hybridization of DNA strands. Most of DNA computing models and experiments were held in vitro. In this paper, a DNA computing paradigm in vivo is present...
详细信息
DNA computing is a bio-computing paradigm based on the specific hybridization of DNA strands. Most of DNA computing models and experiments were held in vitro. In this paper, a DNA computing paradigm in vivo is presented. A synthetic gene network is constructed by RNAi and lactose operon in living cell for solving minimum dominating set problem. This model explores further the ability to solve hard problems based on organism processing signal.
暂无评论