2013 47th International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Universal access through biometrics in mobile scenarios 在移动场景中通过生物识别技术进行普遍访问
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922051
R. Sánchez-Reillo, Ramón Blanco-Gonzalo, J. Liu-Jimenez, Mariano López, E. Cantó
{"title":"Universal access through biometrics in mobile scenarios","authors":"R. Sánchez-Reillo, Ramón Blanco-Gonzalo, J. Liu-Jimenez, Mariano López, E. Cantó","doi":"10.1109/CCST.2013.6922051","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922051","url":null,"abstract":"The main aim of this paper is the development of a new technology for biometric recognition that allows safe and secure access to universal services such as credit card payment, ATMs, access control, border control, etc. The technology being developed is very generic and easily adaptable to the specific particularities of disabled people; a collective that represents an important proportion of current population (e.g. about the 9% of the total Spanish population).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127583112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of encryption algorithms on mobile devices 移动设备上加密算法的性能分析
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922058
Alber O. Montoya B, Mario A. Munoz G, S. Kofuji
{"title":"Performance analysis of encryption algorithms on mobile devices","authors":"Alber O. Montoya B, Mario A. Munoz G, S. Kofuji","doi":"10.1109/CCST.2013.6922058","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922058","url":null,"abstract":"Currently communications through mobile devices are necessary, but use of these is restricted due to the presence of attacks on communications. The encrypted authentication and data encryption are techniques to protect against such threats. Among the different types of encryption algorithms that exist, some are unsafe and additionally may require high computational costs, this also causes the communications not to be carried out at the appropriate times and sometimes the session establishing process fails. This paper shows a strategy that allows an analysis of the most common and safe encryption algorithms, specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH, in order to establish which one of these is the most optimum to be implemented in smartphones and tablets; additionally other algorithms are relate, which are used commonly in many applications, tests are carried out over mobiles devices, which measure the performance and computational cost of the devices when they run each algorithm.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A preliminary application of mobile agents to intrusion detection 移动代理在入侵检测中的初步应用
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 1900-01-01 DOI: 10.1109/CCST.2013.6922045
S. Gutiérrez, J. Branch
{"title":"A preliminary application of mobile agents to intrusion detection","authors":"S. Gutiérrez, J. Branch","doi":"10.1109/CCST.2013.6922045","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922045","url":null,"abstract":"This work presents an application of mobile agents to the topic of intrusion detection. The presented solution implements a distributed system based on agents with the capability of mobility, in such a way that when an abnormal event is detected, the agent located at the host where detection was performed moves across the network modifying the firewall rules of the involved hosts to implement a kind of prevention of the probably on going attack.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130923588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine learning techniques applied to intruder detection in networks 机器学习技术在网络入侵者检测中的应用
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 1900-01-01 DOI: 10.1109/ccst.2013.6922081
J. L. Henao R, J. E. Espinosa O
{"title":"Machine learning techniques applied to intruder detection in networks","authors":"J. L. Henao R, J. E. Espinosa O","doi":"10.1109/ccst.2013.6922081","DOIUrl":"https://doi.org/10.1109/ccst.2013.6922081","url":null,"abstract":"The intrusion in data networks, are a constant problem faced by networks administrators. Because of this, it is necessary identify, study and propose techniques to detect the moment in which the network is attacked, with the purpose of take measures to mitigate these threats. In this paper was conducted a study of the threats taxonomy that could lead to an attack in a data network. For this, we have identified the most relevant characteristics of the network traffic in order to be processed and classified using machine learning techniques, specifically the normalization (Z-Score), dimensionality reduction (PCA) and classification based on artificial neural networks (ANN) to suggest an intrusion detection system (IDS).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131606880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信