Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ...
详细信息
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an...
详细信息
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an equivalent algebraic *** on them,we propose some novel and generalized techniques to study ***,a general method is presented to solve an open problem of how to obtain the properties(the number of fixed points and the cycles with different lengths)of the state sequences produced by a given NLFSR,i.e.,the analysis of a given *** then show how to construct all 22n-(l-n)/22n-lshortest n-stage feedback shift registers(nFSR)and at least 22n-(l-n)-1/22n-l-1shortest n-stage nonlinear feedback shift registers(nNLFSR)which can output a given nonperiodic/periodic sequence with length ***,we propose two novel cycles joining algorithms for the construction of full-length ***,two algorithms are presented to construct 22n-2-1different full-length nNLFSRs,respectively.
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detecti...
详细信息
ISBN:
(纸本)9781849199285
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detection scheme, combining permission and behavior analysis. For APK files which had been detected, their MD5 values are extracted as signature for detection. For APK files which had not been detected, detection is carried based on permission and behavior analysis. Behavior analysis contained taint propagation analysis and semantic analysis. Experiment results show that this system can detect the malware of privacy stealing and malicious deduction successfully.
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f...
详细信息
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, we propose an efficient certificate-based ring signature scheme which does not require any pairing computation. Furthermore, this scheme is proven secure under the Discrete Logarithm assumption in the random oracle model. To the best of authors' knowledge, this is the first construction of certificate-based ring signature scheme in the literature that has such kind of feature.
Delay Tolerate networks (DTNs) are highly partitioned networks and suffer from frequent disconnections,which differs significantly from traditional wireless ***,long delays and frequent end-to-end disconnections make ...
详细信息
Delay Tolerate networks (DTNs) are highly partitioned networks and suffer from frequent disconnections,which differs significantly from traditional wireless ***,long delays and frequent end-to-end disconnections make security in DTNs more *** this paper,we propose a robust security scheme based on elliptic curve cryptography to provide message confidentiality and privacy-preserving for resource-constrained *** proposed scheme is characterized by a non-interactive manner,thus it is excellent for the delay and end-to-end disconnection ***,the scheme only requires point multiplication operations on both the sender and the ***,this scheme is suitable for resource-constrained DTNs.
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detecti...
详细信息
ISBN:
(纸本)9781510802704
The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detection scheme, combining permission and behavior analysis. For APK files which had been detected, their MD5 values are extracted as signature for detection. For APK files which had not been detected, detection is carried based on permission and behavior analysis. Behavior analysis contained taint propagation analysis and semantic analysis. Experiment results show that this system can detect the malware of privacy stealing and malicious deduction successfully.
Most of the "Big Data" applications, such as decision support and emergency response, must provide users with fresh, low latency results, especially for aggregation results on key performance metrics. Howeve...
详细信息
Most of the "Big Data" applications, such as decision support and emergency response, must provide users with fresh, low latency results, especially for aggregation results on key performance metrics. However, disk-oriented approaches to online storage are becoming increasingly problematic. They do not scale grace-fully to meet the needs of large-scale Web applications, and improvements in disk capacity have far out-stripped improvements in access latency and bandwidth. To this end, the paper proposes a memorybased continuous query index to implement scalable and efficient aggregation query.
A multi-bit somewhat homomorphic encryption scheme based on Learning With Errors over Rings (RLWE) assumption is provided, which use canonical embedding to transform elements over a ring into vectors, thus the operati...
详细信息
During the last years, many trust and reputation models have been proposed, each one targeting different contexts and purposes, and with their own particularities. While most contributions focus on defining ever-incre...
详细信息
In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity for false documents, malicious attacks and other malicious acts, so its trust and sec...
详细信息
暂无评论