With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
An incremental intrusion detecting model is proposed in this paper. This model integrates unsupervised Self Organizing Map and supervised Radial Basis Function to complete incremental learning. Self Organizing Map can...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When...
详细信息
ISBN:
(纸本)9781424463886;9780769539874
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When designing security schemes and systems in ATN, the negotiation efficiency, which is a desirable property, is not considered sufficiently. In this paper, a useful model of P. E. evaluation is proposed to enhance negotiation efficiency by improving the efficiency of security schemes used in ATN. The useful model of P. E. evaluation is responsible for choosing a most appropriate policy among several alternative policies that can advance a negotiation at the same time, which makes the negotiation more efficient.
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev...
详细信息
ISBN:
(纸本)9781424463886;9780769539874
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Previous work on improving negotiation efficiency mainly focuses on using history negotiation information, which may leak much unnecessary information and cannot improve the negotiation efficiency if both negotiators do not have appropriate history information. Thus in this paper, we enhance the negotiation efficiency from a new aspect adaptive policies. An ATN framework is designed to enhance the negotiation efficiency, which can not only simplify the negotiation process and reduce the number of exchanged credentials and credential validations whenever possible, but also avoid to revealing unnecessary information during negotiations. This framework presents a number of innovative features, such as the support for overlapping virtual organizations (VOs for short) to evaluate trustworthiness level, and the use of fine-grained adaptive policies to adjust policies based on the trustworthiness levels.
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In...
详细信息
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption so...
详细信息
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Our scheme admits provable security in the random oracle model under the bilinear Diffie-Hellman assumption using the definitions proposed by Boyen and it is also forward secure.
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as...
详细信息
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted computing and virtualization technology. On the service provider's platform, from the very beginning of Virtual Machine Monitor (VMM) was booted to the execution environment was set up, all of the platform status changes has been recorded into Platform Configuration Register (PCR) and reported to remote service requester, which make it sure about the trustworthy of the result. Furthermore, the VM image was leveraged to make the execution environment constructed more flexible. Analysis shows our method is efficient and secure.
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with the bundle protocol of Delay/Disruption Tolerant networks (DTNs). Some bundles which may be error are requested to retransmit in next communication link. An r-uniform random hypergraph model is introduced and the relation is analyzed between the probability of error bundle and the structure of hypergraph.
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th...
详细信息
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on the properties of Maiorana-McFarland's Bent functions, a Bent function with arbitrary degree can be constructed by changing the order of concatenating linear functions.
Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. At present, many electronic voting systems(E-voting) based on the bli...
详细信息
暂无评论