2012 Eighth International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
Study on Numerical Integration Algorithm for PSD Test PSD测试数值积分算法研究
Peng Sun, Xin Guo
{"title":"Study on Numerical Integration Algorithm for PSD Test","authors":"Peng Sun, Xin Guo","doi":"10.1109/CIS.2012.57","DOIUrl":"https://doi.org/10.1109/CIS.2012.57","url":null,"abstract":"This paper focuses on two integration algorithms used for pseudo-dynamic test, explicit New mark algorithm and implicit alpha-C algorithm. The comparison study between the test and simulation results shows that: the non-uniform distribution of mass, restoring force characteristics and higher frequency vibration modality are simulated more accurately using the alpha-C algorithm than using explicit New mark algorithm. The alpha-C algorithm also leads to high iterative accuracy and unconditional stability. Replacing the explicit New mark algorithm in original experimental system by implicit alpha-C algorithm, the MDOF pseudo dynamic test system can be realized successfully.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution 基于动态符号执行的敏感点并行逼近方法
Yan Cao, Qiang Wei, Qingxian Wang
{"title":"The Method for Parallel Approach to Sensitive Point Based on Dynamic Symbolic Execution","authors":"Yan Cao, Qiang Wei, Qingxian Wang","doi":"10.1109/CIS.2012.152","DOIUrl":"https://doi.org/10.1109/CIS.2012.152","url":null,"abstract":"In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identification and location of sensitive points. Then based on dynamic symbolic execution, the algorithm of parallel approach to sensitive point is designed, in order to select for the preferential path and realize iterative approach test. Moreover, we present search algorithm of test cases to reuse forward information and reduce communication redundancy. Finally, the experiment results verify the improvement of symbolic execution efficiency and effectiveness of exception detection.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115836696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis and Improvement of HIBS without Random Oracle 无随机Oracle的HIBS密码分析及改进
Xiaoming Hu, Wenan Tan, Cunli Jiang
{"title":"Cryptanalysis and Improvement of HIBS without Random Oracle","authors":"Xiaoming Hu, Wenan Tan, Cunli Jiang","doi":"10.1109/CIS.2012.112","DOIUrl":"https://doi.org/10.1109/CIS.2012.112","url":null,"abstract":"At Eurocrypt'02, Horwitz and Lynn first introduced the concept of HIBS. Till now, many HIBS schemes have been proposed. Recently (2011), Yang et al.'s proposed a hierarchical identity based signature (HIBS) scheme based on computational Diffie-Hellman (CDH) assumption in the standard model. They claimed that their scheme has more secure and more efficient than the existing HIBS schemes. However, we give an attack to their scheme to show that their scheme is insecure and an attacker can forge private key for any identity. And we also propose an improvement method.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"29 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131016347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Allocation for OFDM System Based on Evolutionary Algorithm 基于进化算法的OFDM系统资源分配
Qiang Wang, Hai-Lin Liu, Jiongcheng Li
{"title":"Resource Allocation for OFDM System Based on Evolutionary Algorithm","authors":"Qiang Wang, Hai-Lin Liu, Jiongcheng Li","doi":"10.1109/CIS.2012.25","DOIUrl":"https://doi.org/10.1109/CIS.2012.25","url":null,"abstract":"The conventional resource allocation method is so-called two-step method in OFDM system. The two-step method can reduce the computational complexity. However, it's solution accuracy is not very good. This paper proposes an improved two-step method. This method combines evolutionary algorithm with simulated annealing thought, and can take into account the sub-carrier distribution and power distribution at the same time. Meanwhile this paper improves the evaluation criteria for fairness, so that the algorithm can better balance between capacity and fairness. Numerical experiments show that the proposed algorithm is effective.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130978031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building the Bridges -- A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem 搭建桥梁——移动NFC生态系统中不同范式融合的建议
Raja Naeem Akram, K. Markantonakis, K. Mayes
{"title":"Building the Bridges -- A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1109/CIS.2012.149","DOIUrl":"https://doi.org/10.1109/CIS.2012.149","url":null,"abstract":"In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport etc.) on a single device. However, despite the initial fervour for the multi-application smart card initiative, there were no wide spread adoption of this model. Nevertheless, the Near Field Communication (NFC) has reinvigorated the multi-application initiative again. In this paper, we will analyse why the multi-application smart card initiative failed to materialise a decade ago and whether this time around it will succeed as a viable model or not. The NFC trials being conducted basically rely on the existing ownership architectures, which can create market segregation and thus reducing the potential revenue generation capability. We propose a possible approach that avoids market segregation, increase revenue generation, and provide flexibility, robustness and scalability to existing ownership architecture.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research on Vision-based Intelligent Vehicle Safety Inspection and Visual Surveillance 基于视觉的智能车辆安全检测与视觉监控研究
Weijun Dai, J. Ge
{"title":"Research on Vision-based Intelligent Vehicle Safety Inspection and Visual Surveillance","authors":"Weijun Dai, J. Ge","doi":"10.1109/CIS.2012.56","DOIUrl":"https://doi.org/10.1109/CIS.2012.56","url":null,"abstract":"Vehicles' safety surveillances have been paid more attentions on by the governments with increasingly rampant terrorist activities like car bombing attacks and illegal immigrations. Lots of terrorists may hide the bombs under the vehicles to avoid the searches by the workers. Illegal immigrants usually adopt the same tricks. Hence, vehicles' bottom will be one of the most important searching places in the safety inspection. However, traditional bottom inspections are accomplished manually with hand-held security mirrors. This method has poor efficiency, limited searching areas, unbearable reliability and large consumption of human resources. So computer vision and intelligent transportation technologies are led into the safety inspections and surveillances according to these critical defects. Line scanned and area scanned CCD cameras are trigged by the vehicle detection apparatus to grab images of the vehicles' bottom and license plates respectively. These images will be processed by the industrial computers real-timely. Sounded alarms can remind the workers there are existing doubtable foreign goods under the bottom. The experimental results indicate preliminarily that the proposed method not only have good performances on detection rate and low false alarm rate, also can improve the reliability effectively.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117338570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and Implementation of a Fault Attack Platform for Smart IC Card 智能IC卡故障攻击平台的设计与实现
Jun Guo, Liji Wu, Xiangmin Zhang, Xiangyu Li
{"title":"Design and Implementation of a Fault Attack Platform for Smart IC Card","authors":"Jun Guo, Liji Wu, Xiangmin Zhang, Xiangyu Li","doi":"10.1109/CIS.2012.150","DOIUrl":"https://doi.org/10.1109/CIS.2012.150","url":null,"abstract":"Fault attack is a kind of attack that the attacker injects faults into the hardware and the secret key is likely to be revealed. The paper will describe a fault attack platform for smart card. This platform includes PC terminal serial console software, smart card interface circuits, and smart card reader fault attack circuits. Then the fault platform could communicate with the contact smart card or the smart card reader by complying with the protocol of ISO/IEC 7816. Using this fault platform, we can inject any glitches on power and clock when the smart card is running the encryption command. And then the fault attack platform can send wrong cipher text to the PC terminal console software through by serial port. We can analyze the fault data by MATLAB or software programming to crack the key of the smart card. So, the security of smart card could be verified. The glitch of voltage range could be from 0v to 5v. And the scope of clock frequency can be from 1HZ to 50 MHZ.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Completion with Automatic Structure Propagation 自动结构传播的图像补全
Peipei Pan, Xin Zheng, Qingqing Xu, Ping Guo
{"title":"Image Completion with Automatic Structure Propagation","authors":"Peipei Pan, Xin Zheng, Qingqing Xu, Ping Guo","doi":"10.1109/CIS.2012.75","DOIUrl":"https://doi.org/10.1109/CIS.2012.75","url":null,"abstract":"In this paper, we propose a novel approach for image completion with automatic structure propagation. This method integrates two stages: Firstly, it extends the salient structure lines from the known regions to the unknown by following a local self-similarity assumption on natural images. Then guided by the structure information, it restores the missing region by patch-based texture synthesis. Experiment results demonstrate a better effect of our method than that of the previous patch-based texture synthesis image completion algorithm.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A High-Speed SHA-1 IP Core for 10 Gbps Ethernet Security Processor 用于10gbps以太网安全处理器的高速SHA-1 IP核
Yang Liu, Liji Wu, Yun Niu, Xiangmin Zhang, Zhiqiang Gao
{"title":"A High-Speed SHA-1 IP Core for 10 Gbps Ethernet Security Processor","authors":"Yang Liu, Liji Wu, Yun Niu, Xiangmin Zhang, Zhiqiang Gao","doi":"10.1109/CIS.2012.60","DOIUrl":"https://doi.org/10.1109/CIS.2012.60","url":null,"abstract":"10Gbps Ethernet Security Processor is very important in future network telecommunication. In order to meet the performance of ultra high throughput of 10Gbps ESP, An architecture of multiple SHA-1 IP cores paralleled based crossbar switch are proposed in this paper. Firstly, An ultra high throughput, low power consumption SHA-1 algorithm IP-core are designed, then, an effective scheduling architecture with SHA-1 IP cores are proposed in this paper. In our simulation with SMIC 65nm, the throughput of single IP core could reach to 4.27Gbps in the frequency of 400Mhz. Verification are based on Xilinx Virtex FPGA, 1943 slices LUTs are used for each SHA-1 IP core. By using this crossbar architecture, the number of SHA-1 IP cores used in 10Gbps Network Security Processor could decrease to four, which decrease the total area and power consumption of Network Security Processor significantly.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Study on Magnetic Force of the Large Displacement Hybrid Suspension System Based on Finite Element Method 基于有限元法的大位移混合悬架系统磁力研究
Tao Wen, Zhengfeng Ming, Youqing Liu, Jinxin Gu
{"title":"A Study on Magnetic Force of the Large Displacement Hybrid Suspension System Based on Finite Element Method","authors":"Tao Wen, Zhengfeng Ming, Youqing Liu, Jinxin Gu","doi":"10.1109/CIS.2012.14","DOIUrl":"https://doi.org/10.1109/CIS.2012.14","url":null,"abstract":"A method for the computation of local magnetic force in suspension system is proposed. Precise calculation of magnetic force in electromagnet is significant to structure design. Therefore, on the basis of finite element method (FEM) and local virtual work method, a mathematical model is built according to the principle of virtual work equivalent, so as to calculate the magnetic force. Application shows it has good accuracy and extensive applicability.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信