More and more file encrypting about office document are required in personal application environment. Limitations about encrypting file system, virtual disk encryption and filtrating driver encryption, are analyzed in...
详细信息
More and more file encrypting about office document are required in personal application environment. Limitations about encrypting file system, virtual disk encryption and filtrating driver encryption, are analyzed in this paper, then a kind of encryption system for office document, combing with plug-in software and smart u-key, is put forward and implemented. File's encrypting procedure in this system is transparent, self-determination and visible, and the whole system is convenient to migrate. Mow word and excel files can be encrypted using this system.
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of c...
详细信息
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of cell maintenance, cell transmission, full circuitry maintenance, range of circuitry maintenance, and switch load algorithmsThese algorithms can use in the distribution networkThe auto-generation only accords the topology information that distilled from the graphicIt is easily use for the maintain personnel.
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ...
详细信息
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***...
详细信息
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement *** this mechanism a single user,whose attributes satisfy the predicate,endorses the *** signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the *** security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
We present a threshold signature based on non-interactive Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resiliencen ≥ 3t + 1, where n is the nu...
详细信息
information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat...
详细信息
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...
详细信息
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the...
详细信息
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the number of the participants and t is the number of the fault participants. The security of this scheme bases on discrete logarithm intractability assumption. We give the security analysis of our proposed threshold signature scheme.
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man...
详细信息
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying many access points to the censored domain. Therefore they face the problem of discovering available nodes and deploying a large number of nodes. Opposite to many access point approach, we present a system building on existing overlay network, a low-cost solution for circumventing Internet, called SkyF2F. SkyF2F is a plug-in for Skype client that allows users to establish a covert communication tunnel across Skype overlay network. We describe the design, a prototype implementation and security analysis of SkyF2F. Our security analysis shows that SkyF2F can successfully circumvent several sophisticated censoring techniques.
暂无评论