2011 7th International Conference on Information Assurance and Security (IAS)最新文献

筛选
英文 中文
Holistic analysis of mix protocols 混合协议的整体分析
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122843
G. Bella, Denis Butin, David Gray
{"title":"Holistic analysis of mix protocols","authors":"G. Bella, Denis Butin, David Gray","doi":"10.1109/ISIAS.2011.6122843","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122843","url":null,"abstract":"Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET). We develop what appears to be the first scalable approach to specifying and analysing mix protocols. It expands on the Inductive Method by exploiting the simplicity with which inductive definitions can refer to each other. This lets the human analyst study each protocol separately first, and then derive holistic properties about the mix. The approach, which is demonstrated on the sequential composition of a certification protocol with an authentication one, is not limited by the features of the protocols, which can, for example, share message components such as cryptographic keys and nonces. It bears potential for the analysis of complex protocols constructed by general composition of others.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ensemble based categorization and adaptive model for malware detection 基于集成的恶意软件检测分类与自适应模型
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122799
M. N. A. Zabidi, M. A. Maarof, A. Zainal
{"title":"Ensemble based categorization and adaptive model for malware detection","authors":"M. N. A. Zabidi, M. A. Maarof, A. Zainal","doi":"10.1109/ISIAS.2011.6122799","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122799","url":null,"abstract":"Malware, a term which was derived from two words; malicious software has caused many problem to the computer users throughout the world. Previously was known as many names; trojan, virus, worms, dialers and many others, thid potientially unwanted software simply labeled as malware. Malware is a software, which works as any other benigh software, but was designed to accomplish the goal of its writers. It was written to exploit the vulnerability of the target victim's operating system or application. Previously was a primitive and easy to detect, it evolves to a sophisticated and professionally written piece of software. Current malware detection method involved string search algorithm which based on the pattern detection. This may include the use of signature based method. In this paper, we propose an ensemble categorization by using ensemble classification and clustering together with adaptive learning model.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison of digital audio watermarking techniques for the security of VOIP communications 数字音频水印技术在VOIP通信中的安全性比较
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122787
Füsun Er, E. Gul
{"title":"Comparison of digital audio watermarking techniques for the security of VOIP communications","authors":"Füsun Er, E. Gul","doi":"10.1109/ISIAS.2011.6122787","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122787","url":null,"abstract":"In this paper, the authors present digital audio watermarking techniques that can be used for source origin authentication in real-time Session Initiation Protocol (SIP) Communications, such as Voice over IP (VoIP). The watermark-enabled VoIP mechanism utilizes audio watermarking techniques as a covert channel between calling parties to send source origin indicator information during the transportation phase of VoIP. The effects of audio watermarking were measured using the Signal-to-Noise Ratio, watermark extract durations and the effects of a-law, u-law and GSM encoding during the transportation phase of VoIP. Moreover, various audio watermarking algorithms were implemented to demonstrate the applicability of aforementioned security solution in terms of certain parameters: robustness, evaluation times, complexity and capacity. The experimental results suggest that some watermarking algorithms are applicable in VoIP, while others are not suitable for source origin authentication.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
State convergence and the effectiveness of time-memory-data tradeoffs 状态收敛和时间-内存-数据权衡的有效性
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122801
Sui-Guan Teo, Kenneth Koon-Ho Wong, E. Dawson, L. Simpson
{"title":"State convergence and the effectiveness of time-memory-data tradeoffs","authors":"Sui-Guan Teo, Kenneth Koon-Ho Wong, E. Dawson, L. Simpson","doi":"10.1109/ISIAS.2011.6122801","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122801","url":null,"abstract":"Various time-memory tradeoffs attacks for stream ciphers have been proposed over the years. However, the claimed success of these attacks assumes the initialisation process of the stream cipher is one-to-one. Some stream cipher proposals do not have a one-to-one initialisation process. In this paper, we examine the impact of this on the success of time-memory-data tradeoff attacks. Under the circumstances, some attacks are more successful than previously claimed while others are less. The conditions for both cases are established.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks 无线传感器网络的两层节能安全路由协议
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122842
A. El-Semary, M. Abdel-Azim
{"title":"A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks","authors":"A. El-Semary, M. Abdel-Azim","doi":"10.1109/ISIAS.2011.6122842","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122842","url":null,"abstract":"Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilize the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature. However, most of these protocols forward packets based on information collected from neighbor nodes. This allows a malicious sensor node to deceive its neighbor to forward their packets through it. This makes the network's nodes vulnerable to various types of attacks such as sinkhole, spoofing, and select forwarding attacks. Therefore, this paper proposes a two-tier energy-efficient secure routing protocol for WSNs in which each sensor node forwards its packets based on its own information. Thus it cannot be deceived by any other sensor node. Simulation results indicate clearly that, the performance of the proposed protocol outperforms that of both the Path Energy Weight and the minimum hop protocols under several attacks such as sinkhole and spoofing or Sybil attacks. In addition, the proposed protocol exhibits a grateful performance under attack-free conditions and evenly distributes the network loads among the deployed nodes to prolong the network life time.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access control taxonomy for social networks 社交网络的访问控制分类法
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122829
Adnan Ahmad, B. Whitworth
{"title":"Access control taxonomy for social networks","authors":"Adnan Ahmad, B. Whitworth","doi":"10.1109/ISIAS.2011.6122829","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122829","url":null,"abstract":"Social networks are online platforms where users form relationships with others by sharing resources. Access control for these social networks is different from other systems as it fulfills the social requirements of community as well as the technical requirements of the system. This paper presents a classification of access control models for social networks based on lattice taxonomy where axes represent the properties of the models. The proposed taxonomy has eight axes representing: requestor identity, mapping authority, resource control, relationship management, credential distribution, access control decisions, rights delegation and transparency. Analysis of existing models using this taxonomy highlights the tradeoffs between user control, state distribution and social needs. The taxonomy reveals that various interesting features of social networks have not been implemented yet and there is a gap between the social requirements and access control features of social networks.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A secure joint wavelet based steganography and secret sharing method 一种基于小波的安全联合隐写与秘密共享方法
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122823
Mohammad Javad Khosravi, S. Ghandali
{"title":"A secure joint wavelet based steganography and secret sharing method","authors":"Mohammad Javad Khosravi, S. Ghandali","doi":"10.1109/ISIAS.2011.6122823","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122823","url":null,"abstract":"In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the stego images are used to recover the shares and, consequently, recover the secret image. The presented algorithm obtains high authentication capability against counterfeiting. Moreover; it is stable against serious attacks, including RS and supervisory training steganalysis methods, and it has the low detection rate under global feature extraction classifier examination.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility 大学信息安全意识:通过责任角色保持可学习性、性能和适应性
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122827
A. R. Ahlan, M. Lubis
{"title":"Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility","authors":"A. R. Ahlan, M. Lubis","doi":"10.1109/ISIAS.2011.6122827","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122827","url":null,"abstract":"As the 21st century approached, the current trend of technology product besides deliver the benefit on availability and accessibility on information, problem emerged regard information security. In order to analyze on how technology introduces new risks, it is necessary to discuss the technology lifecycle. Consider for instance the life cycle of technology as the diffusion of an innovation. Since technological innovations or IT solutions are being adopted to support business processes, the need to protect those IT solutions arises with its adoption. Accordingly, two important factors need much consideration in raising awareness are how organization influences significantly of end user's attitude and how the organization has the regular assessment or evaluation to measure the effectiveness of IS awareness policy inside the organization.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A cooperative intrusion detection scheme for clustered mobile ad hoc networks 一种面向集群移动自组网的协同入侵检测方案
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122816
Hajar Al-Hujailan, Mznah Al-Rodhaan, A. Al-Dhelaan
{"title":"A cooperative intrusion detection scheme for clustered mobile ad hoc networks","authors":"Hajar Al-Hujailan, Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/ISIAS.2011.6122816","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122816","url":null,"abstract":"A mobile ad hoc network is a collection of wireless mobile devices communicating with each other and forming a temporary network, without any pre-deployed infrastructure. Security in MANET is a main and important element for the basic functions of a network. One of the security technologies is intrusion detection system which provides a second line of defense. In this paper, we propose an efficient defense system based on a cooperative scheme to deal with intrusions in clustered ad hoc networks. Our proposed system provides security against all network attacks that can be detected by any node in the network, in particular detects the actor. It is simple, reliable, effective and its performance not affected by status of channel.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields 任意伽罗瓦域多元二次拟群的构造
2011 7th International Conference on Information Assurance and Security (IAS) Pub Date : 2011-12-01 DOI: 10.1109/ISIAS.2011.6122839
Simona Samardjiska, Yanling Chen, D. Gligoroski
{"title":"Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields","authors":"Simona Samardjiska, Yanling Chen, D. Gligoroski","doi":"10.1109/ISIAS.2011.6122839","DOIUrl":"https://doi.org/10.1109/ISIAS.2011.6122839","url":null,"abstract":"In this paper we describe two methods for constructing Multivariate Quadratic Quasigroups (MQQ) in Galois fields of any characteristic and order. Our constructions extend the previously known constructions defined for operations over the prime field of characteristic 2. Application of these new constructions can reduce the public key size of the recently introduced family of public key schemes based on MQQs up to 58 times.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信