Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen...
详细信息
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one.
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational ...
详细信息
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational algebra. Both are viewed as actions that act in opposite manners. We introduce an ordering that allows to rank security decisions according to their efficiency with respect to a given attack. Furthermore, we prove that this ordering defines a lattice-structure that can serve to manage the decision database
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ...
详细信息
ISBN:
(纸本)300018726X
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employs several new coding tools and provides a different video format. In this paper, a robust spatio-temporal segmentation approach to extract moving objects in the compressed domain for H.264 video stream is proposed. Coarse moving objects are firstly extracted from the motion vector field through the MRF classification process. Spatial segmentation is based on the HT coefficient, which is used to refine the object boundary of temporal segmentation results. Fusion of spatio-temporal segmentation is based on region projection based labeling technique. Further edge refinement is performed to smooth the object boundaries. The performance of the proposed approach is illustrated by simulation carried on several test sequences. Experimental results show that the proposed approach can provide the visually similar results as by using spatial domain process with much less computational complexity.
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ...
详细信息
Identity theft is one of the most lucrative criminal endeavors particularly in the United States. Although numerous laws have been enacted in an attempt to address the issue of identity theft, the best protection avai...
详细信息
Identity theft is one of the most lucrative criminal endeavors particularly in the United States. Although numerous laws have been enacted in an attempt to address the issue of identity theft, the best protection available to consumer is constant vigilance. This involves maintaining information confidentiality, continuous monitoring of high risk targets, information storage and disposal, recovering from identity theft.
This paper proposes an optimized Intrusion Detection System (IDS) using Principle Component Analysis (PCA) and Back-propagation Neural network (BNN). Existing neural network based IDS are mainly suffering from two pro...
详细信息
ISBN:
(纸本)4885522161
This paper proposes an optimized Intrusion Detection System (IDS) using Principle Component Analysis (PCA) and Back-propagation Neural network (BNN). Existing neural network based IDS are mainly suffering from two problems: one is to determine the numbers of hidden layers and regulating weight values to configure its topology. The other is to process the large amounts of audit data. In order to increase detection rates and decrease the processing overheads, we exploit Genetic Algorithm (GA). The operation of GA enables IDS based on combination of PCA and BNN to increase their detection rates and decrease processing overheads. The experimental results on KDD 1999 intrusion detection dataset demonstrate the possibility of our approach.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model uses mathematical method to express diverse entities in information and disaster recovery system such as applications, facilities, resources, sub disaster recovery plans, budget, etc. It classifies various resources according to their utilization and payment, and identifies the significance of applications and the conflicts among sub disaster recovery plans. Through expressing relationships among applications, facilities, resources and sub plans, this model selects the best set of sub plans. This model has less subjective parameter and can evaluate disaster recovery planning objectively and quantitatively.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
暂无评论