In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...
详细信息
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
Geometry-based optimal power control was proposed in [14] to transform the power-control problem to a new geometrical problem on the position relationship between a line and some points. This scheme provides a novel v...
详细信息
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f...
详细信息
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To fulfill this requirement,some kind of information selection mechanism is needed. In this paper, a filter-based information selection mechanism is proposed, which is compliant with OMG DDS specification. Then it is implemented in a publish/subscribe middleware prototype *** the mechanism, a publish/subscribe middleware can use the compiler generated by Flex&Bison to compile the filtering rules of the users,which are conform to SQL-like syntax,and generate the filtering syntax *** the subscriber side, when receiving a sample, the middleware substitute the values of the sample into the corresponding positions in the filtering syntax tree. By traversing the tree, the middleware makes the filtering decision. Experiment results reveal that the proposed mechanism is effective.
Track to track association problem is crucial for multisensor data fusion, and become complicated in the presence of sensor bias, random errors, false tracks and missed tracks. In this paper, we apply the optimal Baye...
详细信息
ISBN:
(纸本)9780982443859
Track to track association problem is crucial for multisensor data fusion, and become complicated in the presence of sensor bias, random errors, false tracks and missed tracks. In this paper, we apply the optimal Bayes joint decision and estimation(JDE) which was proposed in [12] to the track-to-track association in the presence of sensor bias and develop a simplified JDE. The optimal Bayes JDE accounts to the possible association error when estimates the relative sensor bias and takes the estimate error into consideration when chooses the track-to-track association by the association cost having the estimation error. Hence it can enhance the accuracy of track-to-track association and reduce the relative bias estimate error. For computational simplicity, in this paper we proposed another JDE algorithm which can reduce the computation and only is slightly worse than the optimal Bayes JDE. The simulations compare the performance of the JDE association, the simplifed JDE developed in this paper, the method proposed in [8], and verify the feasibility and effectiveness of methods.
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ...
详细信息
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some works had been done to resist against glitch attack, which carefully masked AND gate or used Wave Dynamic Differential Logic (WDDL) cell. In this paper, we propose an improved masked AND gate, in which the relationship between input masked values and masks is nonlinear. Usually, when converting S-box operations from GF(2 8 ) to GF(((2 2 ) 2 ) 2 ), all the necessary computations become XOR and AND operations. Therefore, to fully mask AES S-box is to substitute the unmasked XOR and AND operations with the proposed masked AND gate and protected XOR gate. Although the proposed masked AND gate take up one extra XOR gate than Trichina's design and Baek's design, it can resist against glitch attack without using specific gate cell, such as WDDL.
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o...
详细信息
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to constmct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is deter- mined for the number of Boolean functions with rmximum algebraic immunity.
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera...
详细信息
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle Wireless Sensor networks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
Multisignature scheme allows a group of signers to generate a compact signature on a common document that certifies they endorsed the message. However, the existing state of the art multisignatures often suffers from ...
详细信息
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private inf...
详细信息
ISBN:
(纸本)9781467321006
We consider several multiset operations in secure two- party setting where Alice and Bob each have a multiset and they want to perform some private computations over the two multisets without revealing and private information which means no one of them would learn more information than what can be deduced from the *** design some methods to compute union,intersection and element reduction operations effectively and securely and apply these techniques to solve the multiset operations problems in semi-honest setting and consider their extension to the malicious setting.
暂无评论