2009 International Conference on Computer and Communications Security最新文献

筛选
英文 中文
Research and Realization of the Bank Self-service Terminal Based on XFS Standard 基于XFS标准的银行自助终端的研究与实现
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.8
Zeng Fanfeng, Sun Liwei
{"title":"Research and Realization of the Bank Self-service Terminal Based on XFS Standard","authors":"Zeng Fanfeng, Sun Liwei","doi":"10.1109/ICCCS.2009.8","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.8","url":null,"abstract":"This paper discusses adding a new logic processing module which is in line with the WOSA/XFS Standard to the existing self-service terminal. In this module, the mapping relationship of the SP¿Service Provider¿and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that have effectively raise the scalability and manageability of the self-service system to expand, delete and update","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"158 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of the Customer Relationship Management in Enterprise under the E-Commerce 电子商务环境下企业客户关系管理研究
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.49
Ma Jibin, Sun Yonghao, Wu Xu-yan, Chen Xiaoyan
{"title":"Research of the Customer Relationship Management in Enterprise under the E-Commerce","authors":"Ma Jibin, Sun Yonghao, Wu Xu-yan, Chen Xiaoyan","doi":"10.1109/ICCCS.2009.49","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.49","url":null,"abstract":"Fierce market competition forces enterprises to put more and more attentions to the demands of the customer so that the customer relationship management (CRM) becomes increasingly important. Customer relationship management (CRM) is a huge information resource of modern business activity, and almost all the information required in business activity comes from CRM. At the same time, the development of E-Commerce makes CRM become more important to the corporation. Through introducing the importance of the customer satisfaction to the enterprises, this article described the concept of CRM, discussed the relationship between CRM and E-Commerce and at last concluded that CRM is not only a completely new management idea and skill, but also an important part of E-Commerce. Moreover, the specific measures were proposed about the customer relationship management under the E-Commerce environment, which is useful to the development of the enterprises. Lastly but not the least, the inspection mechanism of developing the customer relationship management was introduced to inspect the result of implementing the Customer Relationship Management Under the E-Commerce Environment , which gives the enterprises an effective and perfect method to develop Customer Relationship.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Research of Intrusion Detection Based on Support Vector Machine 基于支持向量机的入侵检测研究
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.43
Liang Bo, C. Yuan
{"title":"The Research of Intrusion Detection Based on Support Vector Machine","authors":"Liang Bo, C. Yuan","doi":"10.1109/ICCCS.2009.43","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.43","url":null,"abstract":"Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method is avoided and ensures the stronger extension ability which makes intrusion detection system to have the better detecting performance.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"115 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120828019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Image Encryption and Steganography Scheme 一种新的图像加密和隐写方案
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.29
Hongmei Tang, Gaochan Jin, Cuixia Wu, Peijiao Song
{"title":"A New Image Encryption and Steganography Scheme","authors":"Hongmei Tang, Gaochan Jin, Cuixia Wu, Peijiao Song","doi":"10.1109/ICCCS.2009.29","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.29","url":null,"abstract":"With the development of network technique, the research of information security technique is becoming more and more important. In this paper, we proposed a new image encryption and steganography scheme. First, the secret message is encrypted through the combination of a new gray value substitution operation and position permutation which makes the encryption system strong. And then the processed secret message is hidden in the cover image to fulfill steganography. Experimental results show that the scheme proposed in this paper has a high security level and better image stego-image quality.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis and Specification for Civil Aviation Information System 民航信息系统分析与规范
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.31
Zhao Yifei, Zhang De, Yue Ren-tian, S. Yongliang
{"title":"Analysis and Specification for Civil Aviation Information System","authors":"Zhao Yifei, Zhang De, Yue Ren-tian, S. Yongliang","doi":"10.1109/ICCCS.2009.31","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.31","url":null,"abstract":"The significance of building the civil aviation information systems is discussed. Followed by the comparison of China's civil aviation information systems with foreign countries, the important factors of the information system are put forward. By making classification and researching of information systems mainly from airlines, airports and air traffic control, the future development of China's civil aviation information systems is concluded.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography 一种改进的基于椭圆曲线密码的代理签名方案
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.36
Xue Sun, Mingping Xia
{"title":"An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography","authors":"Xue Sun, Mingping Xia","doi":"10.1109/ICCCS.2009.36","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.36","url":null,"abstract":"The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and weaknesses in existing schemes. The scheme uses enhanced one-way hash function based on elliptic curves discrete logarithm problem (ECDLP), which has a low computational cost and small key size. This paper discusses related security, working efficiency and reliability issues.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129455032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design of the Handled Virtual Instrument Based on Embedded Technology 基于嵌入式技术的手柄式虚拟仪器设计
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.9
Jiang YuXiang, Han Xi
{"title":"Design of the Handled Virtual Instrument Based on Embedded Technology","authors":"Jiang YuXiang, Han Xi","doi":"10.1109/ICCCS.2009.9","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.9","url":null,"abstract":"Virtual technology of measurement instrument is a significant technology in the field of information technology application. Taking the embedded microprocessor as the core CPU, this paper adopts the modularization design method and proposes a new system structure of handled virtual instrument combined with hardware circuit design technology, embedded operating system program technology and driver program technology. Further more, this paper solves the high speed and stable transition problem of data under the system environment.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing Methods for Time Frequency Peak Filtering 时频峰值滤波的数据处理方法
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.38
Ling Hongbo, Li Yue, Ye Wenhai
{"title":"Data Processing Methods for Time Frequency Peak Filtering","authors":"Ling Hongbo, Li Yue, Ye Wenhai","doi":"10.1109/ICCCS.2009.38","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.38","url":null,"abstract":"Time-frequency peak filtering is a valid method for attenuation of random noise in the bandlimited nonstationary deterministic signals. In order to reduce the zero-drift errors resulted from processing practical data by TFPF, the fixed zero scaling method is used here to implement TFPF. The zero-drift error generated in the two procedures of TFPF, frequency modulation and peak filtering in time-frequency plane, is related to signal scaling and length of discrete Fourier transform. The quantized error is in inverse ratio to length of discrete Fourier transform, and the zero-drift error is rooted in the varying value scaled from zero. The fixed zero signal scaling is convert the zero to the fixed value in span of instantaneous frequency to decrease the error resulting from discretization and to improve uneven two dimensional signal by TFPF. The segment TFPF technique is used to ensure the amplitude is even in one segment, which can reduce the discretization error in filtered signal and recover the weak signal. The results of simulation and processing seismic common shot data show that the improved TFPF can attenuate the strong random noise and have the less zero-drift errors. This improvement further to make the TFPF practicability.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD 基于BEMD的抗几何攻击鲁棒图像水印算法
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.19
D. Minghui, Zhen Jing-bo
{"title":"Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD","authors":"D. Minghui, Zhen Jing-bo","doi":"10.1109/ICCCS.2009.19","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.19","url":null,"abstract":"In this paper, we introduce a robust image watermarking method based on bi-dimensional empirical mode decomposition (BEMD) against geometric distortion. Based on the characteristics of the image theory and human visual system, the proposed method makes use of orthogonal properties of empirical mode decomposition to achieve the BEMD transform on the image. The image is decomposed into a series of IMFs and residue which contain the different frequency parts of the image. So the watermark is adaptively weighed to the different positions of the middle frequency IMF region. The method makes use of the multi-scale analysis characteristics of image BEMD theory and the person’s sense of vision and shows excellent advantage against shearing attack. The method could show the watermark clearly when half of the image has been cut. Experimental results show this method excellent robustness for image shearing. The watermark thus generated is invisible and performs well in StirMark test and is robust to geometrical attacks. Compared with other watermarking algorithms, this algorithm is more robust, especially against geometric distortion, while having excellent frequency properties.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies DRM安全策略的模糊效用因子评估与群仿真
2009 International Conference on Computer and Communications Security Pub Date : 2009-12-05 DOI: 10.1109/ICCCS.2009.23
Zhiyong Zhang, J. Pu, Qingtao Wu, Lili Zhang, Danmei Niu
{"title":"Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies","authors":"Zhiyong Zhang, J. Pu, Qingtao Wu, Lili Zhang, Danmei Niu","doi":"10.1109/ICCCS.2009.23","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.23","url":null,"abstract":"In recent decade, DRM (Digital Rights Management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value chain. An analytic hierarchy structure and its algorithm on the assessment on utility factors' weights for DRM security policies were proposed based on Fuzzy Analytic Hierarchy Process, and then Swarm simulation experiments were further made on the adoptions of typical security policies in combination with the gained weight values. The simulation results show the proposed approach to fuzzy assessments effectively implements rational and optimal decision-making on security policies combinations.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信