In this paper, a robust watermarking algorithm against geometric distortions and common signal processing is proposed. This algorithm is based on two method to solve the synchronization of the original watermarking im...
详细信息
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of t...
详细信息
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of the existing certificateless encryption schemes employ the FO-technique and/or strong assumptions, for example GBDH, Gap-BDH and BDHI, to achieve adaptive chosen ciphertext security (CCA2 security). However, FO-technique introduces redundancy in ciphertext, and strong assumption reduces our confidence in the security of the underlying scheme. In this paper, we present a short-ciphertext CCA2 secure certificateless encryption scheme under the standard BDH assumption. Due to short ciphertext and convincing security, our scheme has practical value.
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer...
详细信息
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Certificateless encryption (CLE) scheme with short ciphertext. The ciphertext length is at least |m|-bit (the length of a plaintext) shorter than the existing CLE schemes while retaining similar efficiency of computation. The new scheme is provably secure against adaptive chosen ciphertext attacks in the random oracle model.
Internal metrics of the software artifact quality may allow the users to measure the quality of the intermediate deliverables and thereby predict the quality of the final product. Therefore corrective actions may be i...
详细信息
Internal metrics of the software artifact quality may allow the users to measure the quality of the intermediate deliverables and thereby predict the quality of the final product. Therefore corrective actions may be initiated as early as possible in the software development life cycle. This paper will discuss one of internal metrics, the coupling metric. Coupling metrics received increased recognition since it is widely agreed that there is an empirical relationships between coupling metrics and vulnerabilities. Therefore coupling metrics are indicators of important quality attributes of software systems. Though many literatures have studied coupling metrics, some limitations of acquiring coupling metrics still exist, e.g., the direct-only coupling (DOC) and indirect coupling with the highest transitive metric (ICHTM). We argue that indirect coupling will reinforce the quality measure based on the direct-only coupling. We also believe that the different weights should be applied to the direct and indirect couplings in order to get the final coupling metric for each entity in the software system. This paper illustrates how our new coupling metric is superior to DOC or ICHTM by a case study. Some advantages of our coupling metrics such as coupling in three levels are also investigated.
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is proposed...
详细信息
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 comp...
详细信息
E-Commerce security has become one of the most important issues in the development of E-Commerce. In this paper, a new model is proposed to facilitate the assessment of E-Commerce security. In our model, both AHP meth...
详细信息
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev...
详细信息
key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor network...
详细信息
暂无评论