In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data...
详细信息
In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data forwarding protocol, which utilizes one-way hash chains to achieve the message integrity, where the intermediate nodes can effectively detect the fault link and the source node of the packet can correctly judge whether the peer-to-peer data transfer is
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape...
详细信息
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The paper analyses the behaviors of delegation in UCON based on OM-AM engineering principles, presents a formalized usage control model with delegation features using BNF Extensions, called as UCON D , and further articulates its hybrid architecture based on Client & Server Delegation Reference Monitors and relative key protocol functions. UCON D is an extension model of UCON ABC in the aspect of delegation authorization, and it resolves the delegation question of Usage Control Model. Moreover, we specify delegation procedure of an application for Digital Medium Resource Distribution System.
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members an...
详细信息
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members and forge their signatures;The dishonest group center can produce a valid signature un behalf of group members. Using Schnorr signature scheme this paper proposes an improve scheme, which has good characteristics: A colluding subset of group members can not produce a valid signature that the group manager can not open;A dishonest group center can not sign messages on behalf of other members;The revocation of the membership is efficient.
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarit...
详细信息
The session key S is divided into the sum of S1 and S2. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation(scheme 1). Under the condition of a discrete logarithm problem, S2 is decrypted by the OPE (oblivious polynomial evaluation) protocol and Lagrange interpolation polynomial (scheme 2). On the basis of a linearly additive combination of scheme 1 and scheme 2, a traitor tracing scheme is formed, which has advantages of both of them, and meanwhile overcomes their disadvantages. It has many advantages such as multi-service, collusion-resistance, asymmetry, black-box tracing, forward-security and backward-security, and its compositive performance is also better than those of existing ones.
This research aims to quantify natural surveillance in urban areas, an important factor for Crime Prevention Through Environmental Design (CPTED), with high resolution. This quantification considers the effect of deta...
详细信息
ISBN:
(纸本)9788585205775
This research aims to quantify natural surveillance in urban areas, an important factor for Crime Prevention Through Environmental Design (CPTED), with high resolution. This quantification considers the effect of detailed configurations of geographical features such as buildings, trees, and fences, which are difficult to model with CAD-based design, on visibility. We define natural surveillance as visibility from roads, and measure such visibility in urban areas by using laser scanning systems borne on a motor vehicle or a hand truck. Visibility can be measured by supposing a laser beam as a human gaze. The measured areas include a neighborhood known to have a high rate of invasion theft and a crime prevention model district in Japan. The results are visualized in 2-D and 3-D space, and the effect of the detailed configurations of geographical features on visibility can be recognized. We propose that a vehicle-borne laser scanning system is useful for measuring natural surveillance in urban areas.
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influenc...
详细信息
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influence of the intrusion upon the system and describes the intrusion as the state transitions of the attackers' capability. Firstly, we correlate the alerts into meta-attack in the constructing algorithm, and then define Cover as the reduction of meta-attack. Secondly, we transform the cover of meta-attack to intrusion model and give the proofs of the equivalences among intrusion model, meta-attack and its cover. Thirdly, we present an algorithm for describing the intrusion model without employing manual work, which makes it superior to the existing methods. Finally, we do some correlation experiments to evaluate and show the performances of both the intrusion model and the algorithms for constructing and describing this model.
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat...
详细信息
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...
详细信息
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i...
详细信息
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video...
详细信息
ISBN:
(纸本)300018726X
In low bit-rate video communication, a coded picture may fit the payload size of one IP packet, especially for the latest video coding standard H.264. Thus, the loss of a packet may result in the loss of a whole video frame. To deal with this kind of packet losses, an error concealment algorithm in the H.264 decoder for whole-frame losses, which is based on a minimum motion vector span, is proposed in this paper. The motion vectors of lost frame are predicted by utilizing the principle of optical flow, and then the lost frame is reconstructed based on the minimum motion vector span. Experimental results on several test sequences show that the proposed approach can effectively reconstruct the lost frame, both in better objective and subjective image quality.
暂无评论