{"title":"A New Blind Signature and Threshold Blind Signature Scheme from Pairings","authors":"Wei Cui, Yang Xin, Yixian Yang, Xinxin Niu","doi":"10.1109/CIS.WORKSHOPS.2007.140","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.140","url":null,"abstract":"An efficient provably secure identity-based blind signature (IBBS) scheme based on bilinear pairings is proposed. Assuming the intractability of the q-Strong Diffie-Hellman problem, our IBBS is unforgeable under adaptive chosen-message and ID attack. Because of avoiding using the inefficient MapToPoint function, our IBBS can offer advantages in runtime over the schemes available. Based on this ID-based blind signature scheme, we describe the first ID-based threshold blind signature (TBS) and show that it has security properties of unforgeability and robustness.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models for Predicting the Value of E-Commerce Trade in China","authors":"Min Liu, Shudong Sun","doi":"10.1109/CIS.WORKSHOPS.2007.156","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.156","url":null,"abstract":"In the literature review, few studies exist, which predict the value of e-commerce. The study establishes models for predicting the value of e-commerce trade in China by use of main statistical indicators and data in Statistical Report on the Internet Development in China released by CNNIC Firstly, factors affecting e- commerce trade value in China and their relation with e-commerce trade value are analyzed. Secondly, models for predicting the future of the factors are proposed. Finally, The combined model is constructed to predict the value of e-commerce in China in the near future, and is proved to be satisfied because the prediction results are close to related statistics released by authority organizations recently.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for the Longest Common Subsequence Problem","authors":"Xuyu Xiang, Dafang Zhang, Jiaohua Qin","doi":"10.1109/CIS.WORKSHOPS.2007.209","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.209","url":null,"abstract":"In order to find the longest common subsequence (LCS) as soon as possible, we, with the method of match pairs, propose the new algorithm of the sequence of DNA, which is efficient both in time and in space on the basis of the improved dynamic programming theorem.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competitive Stock Replenishment Problem in a Two-Echelon Supply Chain with Competing Retailers","authors":"Qing Liu, Dao Huang, He Liu, Yu Tian","doi":"10.1109/CIS.WORKSHOPS.2007.132","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.132","url":null,"abstract":"This paper studies a two-echelon supply chain, with a warehouse and n retailers. The entire supply chain is characterized by several parameters including demand variance, inventory holding cost and backorder penalty cost. We investigate replenishment strategies of this system under decentralized and centralized control. We consider horizontal information sharing between these retailers when the shared information is valuable for stabilization of the system. It is shown that unique Nash equilibrium of the competitive retailers system exists. We also propose demand-depended and equational coordination schemes. These three coordination schemes are compared numerically, the result of the simulation show that penalty cost and holding cost effect replenishment in Nash equilibrium greatly, and although the set of strategies under profit oriented Nash equilibrium balance the supply chain system, it increases system cost.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121848264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Based Fault Diagnosis for the Spacecraft Power System","authors":"Shao Jiye, Wang Rixin, Xu Minqiang, Gao Jingbo","doi":"10.1109/CIS.WORKSHOPS.2007.48","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.48","url":null,"abstract":"Model-based diagnosis has a great advantage compared to other diagnostic methods. This paper develops a fault diagnosis system for the power system of spacecraft using model-based consistent diagnostic theory. Designing the nominal and faulty modes of each component, the qualitative model of the power system is built in a component-based manner using JMPL language. The fault diagnostic engine is constructed using conflict-A* algorithm. Experiments on the spacecraft power system verify that the model of the power system is correct and the diagnosis system developed is very effectively.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation","authors":"Yu Baozheng, Xu Congwei","doi":"10.1109/CIS.WORKSHOPS.2007.81","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.81","url":null,"abstract":"Universal forgery attacks and selected forgery attacks on both weak and strong blind signature schemes based on Elgamal signature equation proposed by Wang et al. are developed. Without using any secret key, anyone can forge a valid signature through selecting some random parameters. The possibility of forging the blind schemes is analyzed and moreover, an improved weak blind signature scheme and an improved strong blind signature scheme are designed. Also, the securities of the improved blind signatures are analyzed.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Yin, En-Liang Hu, Yongming Wang, Nan-Feng Xiao, Yanrong Jiang
{"title":"A Three-Dimensional Encoding Genetic Algorithm for Job Shop Scheduling","authors":"H. Yin, En-Liang Hu, Yongming Wang, Nan-Feng Xiao, Yanrong Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.107","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.107","url":null,"abstract":"In so many combinatorial optimization problems, job shop scheduling problems have earned a reputation for being difficult to solve. GA has demonstrated considerable success in providing efficient solutions to many non-polynomial-hard optimization problems. In the field of job shop scheduling, GA has been intensively researched, and there are nine kinds of methods were proposed to encoding chromosome to represent a solution. In this paper, we proposed a novel genetic chromosome encoding approach, in this encoding method, the operation of crossover and mutation was done in three-dimensional coded space. 5 selected benchmark problems were tried with the proposed three- dimensional encoding GA for validation and the results are encouraging.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specification of Access Control Policies for Web Services","authors":"Miao Liu, W. Zhang, Hua Liu","doi":"10.1109/CIS.WORKSHOPS.2007.34","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.34","url":null,"abstract":"In this paper we design an access control policy language WSACPL for web services. The WSACPL language is comprised of the WSACPL policy ontology, and includes a mechanism to induce SWRL language to express access control rules. The paper also brings up the method to compute authorization results of composite processes in OWLS. On the analysis of cause and kinds of policy conflicts, the paper represents the method to resolve conflicts among WSACPL policies.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"14 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stereoscopic Video Coding Based on H.264 Standard","authors":"Shigang Wang, Xuejun Wang","doi":"10.1109/CIS.WORKSHOPS.2007.32","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.32","url":null,"abstract":"H.264 is an advanced video compression standard absorbing the advantages of the previous standard. In this paper, block-based stereoscopic video coding is presented. The main view of the sequences is encoded as a H.264 bitstream and the auxiliary views are encoded by joint motion and disparity compensation, so that both temporal and spatial redundancy are reduced and high compression is achieved. Investigating the effectiveness of the joint motion and disparity vectors estimation as well as the employing of the H.264 encoder optimizes the whole framework.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Schema of Automated Design Security Protocols","authors":"HaiFeng Xue, Huanguo Zhang, S. Qing","doi":"10.1109/CIS.WORKSHOPS.2007.97","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.97","url":null,"abstract":"This paper proposes a novel approach to automated design of security protocols using artificial immune algorithm based on cord calculs. Designing security protocol is notoriously difficult and error- prone. Artificial immune algorithm is a powerfully intelligent algorithm. The cord calculus is applied to the artificial immune algorithm to instruct the search and compose of security protocols. Automated design of security protocols using artificial immune algorithm can alleviate people's burden of manually design security protocols and get more security and reliable protocols.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}