Applied Mechanics and Materials Vols. 321-324

Paper Title Page

Abstract: With the rapid development of computer and network technology, the security of computer network becomes the most important issue. For the computer network, it not only takes convenience to us, but also takes troubles, such as network security, virus, cockhorse etc.. In this article, we analyse the cause of the security,and then introduce a number of measures of vulnerability detection and protection on computer network security.
2630
Abstract: This paper proposes an information hiding method in presswork based on image and complexity and template matching. First, the message to be hidden is coded by using BCH to facilitate the extraction of hidden information. Secondly, Based on appropriate image block partition, the local image complexity of the block is calculated, which is determined whether to embed watermark in this block. Watermark is embedded on the mid-frequency spectrum in DFT domain. Thirdly, two structural template lines are added in the polar coordinate system for detecting any combination of the geometrical distortions. Then, the hidden data can be extracted without using the original image. The experimental results indicate that the proposed method is robust after high-quality laser printing, offset printing and scanning.
2635
Abstract: The concept of proxy re-encryption (PRE) was first introduced by Blaze et al. Since then several CCA secure PRE schemes have been presented. Weng et al. proposed a non-transitive bidirectional PRE scheme without pairings and proved that their scheme to be PRE-CCA secure in the random oracle model under the CDH assumption. However, we show that Weng et als non-transitive scheme is still transitive under the formal definition of non-transitivity presented in this paper. Moreover, the transitivity of Weng et al.s scheme also implies that it is not PRE-CCA secure.
2639
Abstract: Privacy has become one of the most important human rights of the modern age. In a proxy multi-signature scheme, the verifier need get all the original signers’ public keys together to verify its validity. However, the relationships between the proxy signer and the original signers would be leaked in the verification process. In this paper, we propose a secure proxy multi-signature scheme in standard model with the property of independent verification. In the scheme, the verifier can verify the signature using the public keys of the special original signers, rather than collecting all the original signers’ public keys.
2643
Abstract: Using the derivative of the Boolean function and thee-derivative defined by ourselves as research tools, we study the problem of relationship between algebraic immunity,correlation immunity and propagation of H Boolean functions with weight of and satisfying the 1st-order propagation criterion togetherwith the problem of their compatibility. We get the results , suchas the relationship between the number of annihilators and correlation immunityorder, the relationship between the number of correlation immunity order and algebraic immune degree together with theircompatibility and the largest propagations of H Boolean function, the relationships between propagationsof Boolean function, correlation immunity order and algebraic immune degree.
2649
Abstract: Radio Frequency Identification (RFID) technology has been gradually into our daily production and life as a new non-contact automatic identification technology.However , the limited resources of low-cost RFID largely restrict the implementation of RFID security mechanisms,which leads to personal privacy issues ,and the issues greatly hinder the rapid adoption of the technology.Here, RFID communication model and security requirements are discussed,and then it analyzes the security solutions for low-cost RFID systems.
2653
Abstract: Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.
2657
Abstract: Symmetric key fuzzy Identity-Based Encryption (IBE) is a special type of IBE in secret key model. In this paper we extend the notion to the case of fuzzy Identity-Based Encryption, and give a formal definition of symmetric key fuzzy IBE and its security requirements. Moreover, we propose a construction of symmetric key fuzzy IBE based on the public key fuzzy IBE of Sahai and Waters, and prove its security.
2665
Abstract: The multivariate public key cryptosystem is a new and fast public key cryptosystem. This paper investigates the security of Square minus scheme, and presents a method to attack the scheme. The attack utilizes the affine parts of the private keys and the weakness caused by the structures of the private keys to find a large number of linear equations. The attack can recover the private keys efficiently when the parameters are small enough.
2669
Abstract: As malware has become increasingly sophisticated over the past several years, it is no longer unusual to see it disable critical security services on a victims machine. In our threat model, we assume the attacker can compromise the users OS and any application running inside it. The results show that our threat model makes an introspection assumption stating that the OS and application level data structures in the User VM memory have not been altered, it is still instructive to consider what it would take to perform this type of attack, and the most security critical data is located in the User OS kernel.
2674

Showing 521 to 530 of 610 Paper Titles