2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Efficient Certificate-Based Signature Scheme 高效的证书签名方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.62
Yang Ming, Yumin Wang
{"title":"Efficient Certificate-Based Signature Scheme","authors":"Yang Ming, Yumin Wang","doi":"10.1109/IAS.2009.62","DOIUrl":"https://doi.org/10.1109/IAS.2009.62","url":null,"abstract":"In this paper, we give the secure model of certificate-based signature (CBS) and propose an efficient CBS scheme. The proposed scheme is shown to be existentially unforgeable against adaptive chosen message and identity attacks under the discrete logarithm assumption in the random oracle model. Compared with the schemes in RSA 2004 and in EuroPKI 2007, no pairing computation and the special MapToPoint hash function is needed in all phase, and hence,our scheme is more efficient.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks 移动网络视频流的gop级传输失真建模
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.107
Yu Han, Aidong Men, Kan Chang, Ziyi Quan
{"title":"GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks","authors":"Yu Han, Aidong Men, Kan Chang, Ziyi Quan","doi":"10.1109/IAS.2009.107","DOIUrl":"https://doi.org/10.1109/IAS.2009.107","url":null,"abstract":"A major challenge in video coding and transmission over mobile networks is that the wireless channel is error-prone and the channel resources are limited. In this work, we analyze the picture distortion caused by channel errors and the distortion propagation behavior in its subsequent frames along the motion prediction path. We propose a linear fitting approach algorithm to achieve a low complexity GOP-level transmission distortion modeling. It is a predictive modeling which allows the encoder to predict the transmission distortion before the whole GOP is compressed and transmitted. The simulation results demonstrate that the proposed modeling has low computational complexity and high accuracy. It can be used in allocating the limited channel resources optimally for mobile video applications.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125457797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Effective Texture Spectrum Descriptor 一种有效的纹理谱描述符
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.126
Xiaosheng Wu, Junding Sun
{"title":"An Effective Texture Spectrum Descriptor","authors":"Xiaosheng Wu, Junding Sun","doi":"10.1109/IAS.2009.126","DOIUrl":"https://doi.org/10.1109/IAS.2009.126","url":null,"abstract":"The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel and is hard to choose a threshold for recognizing the flat area. A novel improved CS-LBP operator, named ICS-LBP, is proposed in this paper. The new operator classifies the local pattern based on the relativity of the center pixel and the center-symmetric pixels instead of the gray value differences between the center-symmetric pixels as CS-LBP, which can fully extract the texture information discarded by CS-LBP descriptor. Comparisons are given among the three methods and the experimental results show the performance improvement of the new descriptor.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115870083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System 基于群决策的电力信息系统支持向量机安全评估方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.234
Xiaorong Cheng, Yan Wei, Xin Geng
{"title":"A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System","authors":"Xiaorong Cheng, Yan Wei, Xin Geng","doi":"10.1109/IAS.2009.234","DOIUrl":"https://doi.org/10.1109/IAS.2009.234","url":null,"abstract":"In accordance with the characteristics and the special demands of electric power information system, this paper designs a support vector machines (SVM) risk assessment method based on group decision-marking. According to security technology indices of electric power information system, the method chooses the mode of expert scoring, based on the group decision-marking, to calculate integrated value of each index, which is as a training sample used to train SVM, and it forecasts risk level for the system. Finally, it verifies the correctness of the method by analyzing results of the examples of the electric power information system security assessment. The experiment shows that the method can not only forecast the current risk level of the electric power system with a high accuracy rate, but also reduce the influence of the subjective factors in some degree.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting DoS and DDoS Attacks Using Chi-Square 使用卡方法检测DoS和DDoS攻击
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.292
Fang-Yie Leu, C. Pai
{"title":"Detecting DoS and DDoS Attacks Using Chi-Square","authors":"Fang-Yie Leu, C. Pai","doi":"10.1109/IAS.2009.292","DOIUrl":"https://doi.org/10.1109/IAS.2009.292","url":null,"abstract":"In this paper, we propose an agent_based distributed intrusion detection architecture, which detects DoS/DDoS attacks by comparing source IP addresses’ normal and current connection frequencies. First, we collect source IPs’ packet statistics to obtain their normal packet distribution. When current statistics suddenly increase, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal 脉冲信号下非相干TOA估计的Cramer-Rao下界
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.205
Jie Liu, Xiaoji Liu, Lin Zheng
{"title":"Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal","authors":"Jie Liu, Xiaoji Liu, Lin Zheng","doi":"10.1109/IAS.2009.205","DOIUrl":"https://doi.org/10.1109/IAS.2009.205","url":null,"abstract":"The non-coherent time-of-arrival (TOA) estimations are applied in impulse location for its simplicity. However, the multipath propagation of the narrow pulse results in complicated performance analysis. By fitting the output envelope of energy detection into a exponential decay, we approximately deduce the closed-form Cramer-Rao low bound (CRLB) of TOA estimation. Simulations with non-coherent TOA algorithms, such as threshold crossing (TC) and maximum energy selection (MES), validate the analysis. Furthermore, the integration window and multipath delay spread in ultra-wideband channel are considered to obtain a referable bound.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134272116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Source Address Validation Scheme Based on IBS 一种新的基于IBS的源地址验证方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.109
Ningning Lu, Huachun Zhou, Hongke Zhang
{"title":"A New Source Address Validation Scheme Based on IBS","authors":"Ningning Lu, Huachun Zhou, Hongke Zhang","doi":"10.1109/IAS.2009.109","DOIUrl":"https://doi.org/10.1109/IAS.2009.109","url":null,"abstract":"Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme can successfully guarantees authenticity of IP packet’s information source.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134294111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generalization of de Weger's Method de Weger方法的推广
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.153
Chien-Yuan Chen, C. Hsueh, Yu-Feng Lin
{"title":"A Generalization of de Weger's Method","authors":"Chien-Yuan Chen, C. Hsueh, Yu-Feng Lin","doi":"10.1109/IAS.2009.153","DOIUrl":"https://doi.org/10.1109/IAS.2009.153","url":null,"abstract":"This paper generalizes de Weger's method if the ratio of two RSA primes frac{p}{q} is close to a simple fraction frac{b}{a}.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131482860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks 无线传感器网络无距离快速粗糙节点定位算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.331
Wang Mei, Xiaochuan Sun, Zheng Hao
{"title":"Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks","authors":"Wang Mei, Xiaochuan Sun, Zheng Hao","doi":"10.1109/IAS.2009.331","DOIUrl":"https://doi.org/10.1109/IAS.2009.331","url":null,"abstract":"Localization problems of the WSNs (wireless sensor networks)geostationary nodes are studied,and the localization algorithm (Fast and Rough Nodes Location Algorithm) based on the communication power mediation for geostationary nodes by receiving the localization information from anchor nodes is presented.The localization estimate of localized nodes is executed in lesser field for higher accuracy.The simulation results show that the algorithm has a small amount of communication, high positioning accuracy, balancing payloads, and is suitable for random deployment.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nonlocal Curvature-Driven Diffusion Model for Image Inpainting 图像涂抹的非局部曲率驱动扩散模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.141
Li Li, Han Yu
{"title":"Nonlocal Curvature-Driven Diffusion Model for Image Inpainting","authors":"Li Li, Han Yu","doi":"10.1109/IAS.2009.141","DOIUrl":"https://doi.org/10.1109/IAS.2009.141","url":null,"abstract":"A nonlocal image inpainting model is proposed by incorporating the nonlocal differential operators into the curvature-driven diffusion model. The new model differs from the original model in that pixels of similar structures rather than pixels in the neighborhood (the case for the original model) are utilized to estimate the lost pixels. This difference makes the new model performs very efficiently in inpainting images, especially textured images.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131135198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信