2011 International Conference on Network Computing and Information Security最新文献

筛选
英文 中文
A New Approach to Estimate RED Parameters Using Global Congestion Notification 一种利用全局拥塞通知估计RED参数的新方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.101
Özen Yelbasi, E. Germen
{"title":"A New Approach to Estimate RED Parameters Using Global Congestion Notification","authors":"Özen Yelbasi, E. Germen","doi":"10.1109/NCIS.2011.101","DOIUrl":"https://doi.org/10.1109/NCIS.2011.101","url":null,"abstract":"In communication networks, congestion avoidance in routers is one of the hottest topics. In this work, a new queue management approach is proposed on the RED (Random Early Detection) algorithm by monitoring the global congestion situation of an autonomous system. In order to observe the congestion situation of the system, a traffic is generated between routers and a centralized unit. IP routers are arranged in order to send information packets regarding current output queue levels to the centralized unit which helps to produce a global picture of congestion. The autonomous routers update their RED parameters according to the congestion notification of the control unit. In this work the benchmarks of the proposed algorithm have been investigated in an OPNET model and improvements on recent queue management technologies which are Drop Tail and RED have been introduced.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Fragile Watermarking Scheme Based on Hash Function for Web Pages 基于哈希函数的网页脆弱水印方案
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.91
Zulin Zhang, Hong Peng, Xianzhong Long
{"title":"A Fragile Watermarking Scheme Based on Hash Function for Web Pages","authors":"Zulin Zhang, Hong Peng, Xianzhong Long","doi":"10.1109/NCIS.2011.91","DOIUrl":"https://doi.org/10.1109/NCIS.2011.91","url":null,"abstract":"With the development of Internet, the integrity protection of web pages has become an important problem. A fragile watermarking scheme based on hash function for web pages is proposed in this paper. Watermarks are generated by using hash function and these watermarks are related to the web page's content. Then, the watermarks are embedded into the tags and embedding locations, which are randomly pointed. In the detection phase, regenerated watermarks and extracted watermarks are got from the watermarked web page. Finally, according to comparing the mentioned above two kind watermarks, we can judge whether the web page has been tampered or not. In addition, we can also identify the types of modification and locate the locations of modification.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Model and Simulation of Narrowband Ground-to-Air Fading Channel Based on Markov Process 基于马尔可夫过程的窄带地空衰落信道建模与仿真
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.37
Jianbo Yang, Peng Liu, H. Mao
{"title":"Model and Simulation of Narrowband Ground-to-Air Fading Channel Based on Markov Process","authors":"Jianbo Yang, Peng Liu, H. Mao","doi":"10.1109/NCIS.2011.37","DOIUrl":"https://doi.org/10.1109/NCIS.2011.37","url":null,"abstract":"According to the height of the flight platform, using a Markov process, switching between the Rice model and classic Loo model, is used to describe the ground-to-air fading channel. Each model is made to experience sight and severe shadowing states respectively. In order to improve the adaptability of the model, the Rice and Loo model are improved, and the Doppler power spectral density and probability density function of amplitude and phase of the two modified models are derived. The results of the simulation showed that the modified model of the Doppler power spectral density curve was an asymmetric shape, and the model adaptation is promoted, and it is clearly seen that the channels have different effects on signal transmission in different process and in different states.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"47 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Automatic Pedestrian Detection and Tracking Method: Based on MACH and Particle Filter 基于MACH和粒子滤波的行人自动检测与跟踪方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.84
Qiulei Han, Z. Yao
{"title":"An Automatic Pedestrian Detection and Tracking Method: Based on MACH and Particle Filter","authors":"Qiulei Han, Z. Yao","doi":"10.1109/NCIS.2011.84","DOIUrl":"https://doi.org/10.1109/NCIS.2011.84","url":null,"abstract":"This paper introduces a pedestrian detecting and tracking approach. Correlation filters present the composite properties which have been successively used in target detection. Particle filter are combined to locate the targets in real-time. Our contribution is proposing a general algorithm that is able to detect and track pedestrians in clutter environments. We also create a different view pedestrian dataset. Experiments show our algorithm is comparative when there is block and occlusion in tracking.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Library Functions by Processes 按进程划分的库函数
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.140
Kun-Rong Wu
{"title":"Library Functions by Processes","authors":"Kun-Rong Wu","doi":"10.1109/NCIS.2011.140","DOIUrl":"https://doi.org/10.1109/NCIS.2011.140","url":null,"abstract":"Some systems are resourceful and can been seen as a rich environment. This paper presents an innovative way of establish process equivalence in such systems. A translation from a procedural programming language to the $pi$-calculus is given. Programs can rely on a set of library functions we define. In this scenario, some very simple programs, or processes, when utilizing the powerful environment, can be equal to some very complex processes. Therefore, the way we handle process equivalence in powerful environment can shed new light on how to reduce the complexity of user processes and how the environment affects its client processes.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificateless Authenticated Key Agreement Protocol against KCI and KRA 针对KCI和KRA的无证书认证密钥协议
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.51
Hongtu Li, Hu Liang, Yuan Wei, Jianfeng Chu
{"title":"Certificateless Authenticated Key Agreement Protocol against KCI and KRA","authors":"Hongtu Li, Hu Liang, Yuan Wei, Jianfeng Chu","doi":"10.1109/NCIS.2011.51","DOIUrl":"https://doi.org/10.1109/NCIS.2011.51","url":null,"abstract":"In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we propose a new protocol based on CL-PKC. The new proposed protocol achieves most of the required security attributes. Security analysis shows that it achieves the attributes of forward secrecy, known-key secrecy, no-key control, key compromise impersonation and key replicating.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensure Data Security in Cloud Storage 确保云存储中的数据安全
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.64
Xiao Zhang, Hong-tao Du, Jian-Quan Chen, Yi Lin, Leijie Zeng
{"title":"Ensure Data Security in Cloud Storage","authors":"Xiao Zhang, Hong-tao Du, Jian-Quan Chen, Yi Lin, Leijie Zeng","doi":"10.1109/NCIS.2011.64","DOIUrl":"https://doi.org/10.1109/NCIS.2011.64","url":null,"abstract":"The cost of maintain a data center is increasing rapidly, especially for the medium data center. An economic choice is to use cloud computing and cloud storage instead of manage data center by itself. Small companies buy compute and storage service just like water and electronic. The difficulty is how to ensure their data safe in cloud storage. Cloud storage provider claims that they can protect the data, but no one believes them. In this paper, we present a framework to ensure data security in cloud storage system. In the framework, we use SLA as the common standard between user and provider. And we discuss several technologies to make the data stored in cloud safe. These technologies can be divided into three parts: storage protect, transfer protect and authorize.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
A Novel Hybrid Method Based on Genetic Algorithms and Neural Networks 一种基于遗传算法和神经网络的新型混合方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.102
Zhibin Zhu, Anwa Zhou, De He, Shuo Wang
{"title":"A Novel Hybrid Method Based on Genetic Algorithms and Neural Networks","authors":"Zhibin Zhu, Anwa Zhou, De He, Shuo Wang","doi":"10.1109/NCIS.2011.102","DOIUrl":"https://doi.org/10.1109/NCIS.2011.102","url":null,"abstract":"In this paper, according to the characters of neural networks and genetic algorithms, we present a new hybrid intelligence optimization algorithm. The idea of genetic algorithms is embedded on the weight adjustment of neural networks. The numerical results show that the method is efficient.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116494682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Management Scheme of Trusted Application Software 可信应用软件管理方案研究
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.70
Huang Hong, Wang Chang-hui, Wang Ben
{"title":"Research on Management Scheme of Trusted Application Software","authors":"Huang Hong, Wang Chang-hui, Wang Ben","doi":"10.1109/NCIS.2011.70","DOIUrl":"https://doi.org/10.1109/NCIS.2011.70","url":null,"abstract":"In cognizance of the problem that application software was maliciously tampered, this paper proposes a management scheme of trusted application software. In this scheme, there is a Software Management Group (SMG) which is a trusted third party. SMG executes software credibility assessment and certification. Users communicate with SMG before they install or run software, get the installation certification and status indicators, to ensure that the software has not been tampered maliciously before installation and in the process of use. The proposal for this scheme provides a new idea and management mechanism for the chain of trust transmitting from Operating System to trusted applications in trusted computing. Principles and mechanisms of the scheme are described amply in this paper.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Autocorrelation and RFM Autocorrelation Performance of Skew Tent Sequence 改进斜帐篷序列的自相关和RFM自相关性能
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.67
Bin Chen
{"title":"Improving Autocorrelation and RFM Autocorrelation Performance of Skew Tent Sequence","authors":"Bin Chen","doi":"10.1109/NCIS.2011.67","DOIUrl":"https://doi.org/10.1109/NCIS.2011.67","url":null,"abstract":"Chaotic sequences have been widely used as pseudorandom sequences. But some well known chaotic sequence has poor autocorrelation, or after modulation, autocorrelation performance become poor, and their applications are limited. Such as Skew Tent sequence, not only has poor autocorrelation performance, but also its RFM signal has poor autocorrelation, too. Based on recently presented APAS theorem, we modified Skew Tent map to DS-Skew Tent map, and DS-Skew Tent sequence has excellent autocorrelation and RFM autocorrelation performance and has simple structure, whereas its other performances are remained invariant or become better, and can be used more widely","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信