Advanced Materials Research Vols. 846-847

Paper Title Page

Abstract: Based on comprehensive analysis on security requirements of information transmission, security primitive is generated by automatic tool in asymmetric key cryptosystem, and improved with addition of compositional factors. And then, formal processes of secure information transmission are constructed with composition method. Formal analysis shows that, secrecy, integrity, availability, controllability, non-repudiation and identifiability during information transmission can be insured by this architecture, as a common framework for development of various application systems in digital campus from the viewpoint of information security.
1644
Abstract: Network survivability is a hotspot in network information security. Predicting effectively network survivability can grasp the survival state of the system, in order to take appropriate measures to improve the system performance. This paper summarizes the existing lack of prediction methods, and then uses GM (1,1) model and ARMA(p,q) model to predict for the survival system performance. Furthermore, Effectiveness of both methods is verified by an example. At last it expounds their respective advantages and disadvantages.
1648
Abstract: This paper describes identity-based digital signature. On this basis, we introduce blind digital signature to propose a new identity-based blind digital signature scheme and analyze the performance between this new scheme and a previous one. Then we discuss the application of identity-based blind digital signature in the performance evaluation and design an online performance evaluation scheme.
1652
Abstract: This paper analyzes the lack of the existing network security isolation technology in internal information network, for these deficiencies, designed new gateway security isolation scheme. Based on analyzing the computing trust mechanism and the gateway security isolation system security requirements, using the fifth generation of network isolation technology, identification authentication technology, tags technology and other technologies, proposed a new network security isolation programs based on trusted computing technology, designed gateway security isolation system and trusted computing information protection model, studied network access control mechanism based on the model. The program is simple and flexible and more secure than traditional security isolation scheme.
1656
Abstract: This paper introduces a typical softswitch network systems, analyzes security threats that may exist of softswitch network. For these security issues, we propose a solution that can operate with IPSec system as the core on the basis of the existing softswitch network. Which will helpfully solve the illegal terminal access, network attacks, virus threats and other security issues and enhance the security of softswitch network.
1660
Abstract: . In allusion to the high delay, restricted nodes resources and lack of persistent end to end connections in Delay /Disruption Tolerant Networks ( DTN) ,this paper proposes a novel directed flooding routing algorithm based on location information. The algorithm combines DTN with the known nodes locations in communication channel to improve the DTN networks topology knowledge to reduce the noneffective duplicate,then conducts single duplicate routing depending on location. The algorithm can increase the directivity and purposiveness of message transmission, decrease the consumption of networks resources, and thereby reduce propagation delay and improve the delivery ratio. The simulation shows that the proposed algorithm is feasible and effective, and it is superior to the typical DTN routing algorithms such as Epidemic Routing.
1664
Abstract: This paper introduces the current information hiding method based on XML, Analyzes their advantages and disadvantages. According to the characteristics which the change of XML document tag attributes order does not affect the document uses, I propose a more subtle and easier method to achieve information hiding. Experimental results show that: the method is correct, has strong concealment and robustness.
1668
Abstract: Currently a spam filtering method is extracting attributes from e-mail header and using machine learning methods to classify the sample sets. But as time goes on, spammers transform different ways to send spam, which result in a great change of spam's header. So the attributes defined in the past could not deal with this change sufficiently. This paper extracted attributes from all possible forged header fields to expand the feature sets, then used the rough set theory to classify the sample sets. Experiment validated more attributes including in feature sets may lead to greater performance, in terms of higher recall and precision, lower fake recognition than other algorithms.
1672
Abstract: With the large-scale promotion and application of CAN bus in automotive electronics, a set software tool supporting the development, analysis and test of CAN bus network is required for the design of CAN network and single automotive electronic unit. Since the CAN bus development and analysis tool adopted by the buyer is quite expensive and it should be bonded to specific CAN card, it is not applicable for parallel development. The team of the author realized a low-cost CAN network development and analysis tool with Java and JNI by taking Eclipse as the development platform. The tool mainly includes two parts, namely the networking protocol design tool and bus monitoring tool. The former realizes the design of signal matrix, provides several views for the network signal, and generates XML signal matrix as the interface of bus monitoring tool; while the latter realizes the control and interface of ordinary CAN card, which will carry out the real-time monitor of bus data and provide several views of the data for further analysis through connecting CAN card to the CAN bus network.
1676
Abstract: OA system widely used in government agencies, large enterprises and institutions. For data exchange between different application systems, the use of XML technology research public data exchange platform. First, the logical structure of public data exchange to achieve data exchange between application system, heterogeneous operating systems and databases; Then study XML data exchange, including the basics of XML, XML data exchange technical advantages, using XML processing data ways etc. Finally, study data exchange platform, XML data exchange technology makes data exchange simple and convenient. The content of this paper, to facilitate the development of data exchange between different systems, speed the development process, improve data reuse, reduce development costs, easy maintenance advantages.
1681

Showing 361 to 370 of 429 Paper Titles