This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f...
详细信息
Wireless mobile computing devices are used extensively to access the Internet for critical applications and services, which must be secured by computationally efficient algorithms and schemes. Computationally efficien...
详细信息
Wireless mobile computing devices are used extensively to access the Internet for critical applications and services, which must be secured by computationally efficient algorithms and schemes. Computationally efficient security schemes, however, require accurate time synchronization between client and application servers, which is very challenging due to its susceptibility to stochastic noise on the transmission path and to message delay attacks where an adversary can intentionally delay measurement messages in order to compromise the scheme. In statistically noisy networks, accurate time synchronization requires filtering of a large number of measurements to reduce stochastic noise. Each measurement must be secured and, therefore, computationally efficient schemes are required to facilitate mobile computing. Efficient security schemes are also required to detect message delay attacks and to authenticate synchronization message sources (e.g. multicast host server and clients). We propose a computationally efficient time synchronization scheme, which achieves accurate and reliable time clock-offset estimates from a single measurement. This approach is based on a per node quality of service scheme, which can be easily incorporated into existing and emerging quality of service scheduling disciplines. It is designed to reduce stochastic noise by providing per node delay guarantee for synchronization. We also propose an efficient and reliable scheme to detect message delay attack. The proposed scheme compares synchronization messages round trip delay with predefined thresholds to ensure that they fall within expected limits, otherwise they are discarded.
Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object systems (ITDOS) research...
详细信息
Length reduction of evanescent-mode ridge waveguide bandpass filters is investigated extensively. Based on the conventional filter configuration, two new filter configurations are proposed: one is the generalized filt...
详细信息
Length reduction of evanescent-mode ridge waveguide bandpass filters is investigated extensively. Based on the conventional filter configuration, two new filter configurations are proposed: one is the generalized filter, and the other is the folded filter. In the generalized filter configuration, the cross sections of the evanescent waveguide and the ridge waveguide are not necessarily the same. It is found that the filter length can be reduced by enlarging the evanescent waveguide height. In the folded filter configuration, the filter is folded back at the middle coupling section. The folded junction is ridged to provide the required coupling between the two ridge waveguide resonators it connects. A design example demonstrates the feasibility of this filter configuration.
We summarize our three research projects related to software configuration management and discuss three challenges for the future research in software configuration management. The three projects that we discuss are d...
详细信息
作者:
宋红石峰Department of Computer Science and Engineering
Beijing Institute of Technology Beijing 100081 China Department of Computer Science and Engineering
Beijing Institute of Technology Beijing 100081 Chinaecurity access control systems and automatic video surveillance systems are becoming increasingly important recently and detecting human faces is one of the indispensable processes. In this paper an approach is presented to detect faces in video surveillance. Firstly both the skin-color and motion components are applied to extract skin-like regions. The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm. Secondly the image is clustered into separated face candidates by using the region growing technique. Finally the face candidates are further verified by the rule-based algorithm. Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.
Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable *** this paper,an approach is presented to de...
详细信息
Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable *** this paper,an approach is presented to detect faces in video ***,both the skin-color and motion components are applied to extract skin-like *** skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference ***,the image is clustered into separated face candidates by using the region growing ***,the face candidates are further verified by the rule-based *** results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.
With networks increasingly moving into virtually every aspect of our daily life, security is gaining importance, not only from the traditional perspective of communication but the network's growing role in modern ...
详细信息
With networks increasingly moving into virtually every aspect of our daily life, security is gaining importance, not only from the traditional perspective of communication but the network's growing role in modern automation and control. The traditional, certification based approach attempts to guarantee the security of a network through certification. Certified networks are generally confined to a limited domain and, as a result, they are isolated, costly, and under-utilized. In contrast, this paper presents a new principle – user-level, security-on-demand system, wherein the network allocates, where possible, the security resources commensurate with the user's request for transporting message(s) through the network securely. This principle is successfully demonstrated for the current Asynchronous Transfer Mode (ATM) networks, and is the result of an integration of the fundamental framework for network security, recently proposed by the authors in the literature, with the unique characteristics of ATM networks. The framework encapsulates the fundamental knowledge and set of relationships in network security and permits scientific and systematic reasoning about network security. It also enables all user groups – military, government, industry, and academia, to define their security requirements in a uniform manner. The security-on-demand approach promises the development of a "mixed use" class of networks in the future that may be simultaneously shared by different groups of users, with the system sustaining the diverse security requirements of each user. A unique characteristic in ATM network design is the dynamic call setup process. Under it, a network first establishes a virtual path or route for a user's call, guided by the user's requirements, and then transports the messages when a route has been successfully determined. This unique ATM characteristic is integrated with the framework to yield a successful demonstration of the proposed, user-level, security-on-d
UML has become the de facto standard for object-oriented modelling. Currently, UML comprises several different notations with no formal semantics attached to the individual diagrams or their integration, thus preventi...
详细信息
In this paper, we develop receiver concepts for transmission with space-time block codes (STBC) over frequency-selective fading channels. The focus lies on Alamouti's STBC, but the results may be generalized to re...
详细信息
In this paper, we develop receiver concepts for transmission with space-time block codes (STBC) over frequency-selective fading channels. The focus lies on Alamouti's STBC, but the results may be generalized to related STBC. We show that a straightforward combination of conventional equalizers and a space-time block decoder is only possible if at least as many receive antennas as transmit antennas are employed, but not for the practically interesting case of pure transmit diversity. This restriction is circumvented by our approach. Equalizers with widely linear (WL) processing are designed, utilizing the structural properties of the transmit signal of space-time block coding, which is shown to be improper (rotationally variant). These schemes are especially suited for equalization of high-level modulated signals, which are used in third-generation time-division multiple access mobile communications standards such as EDGE (Enhanced Data Rates for GSM Evolution).
暂无评论