2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
A New Blind Signature and Threshold Blind Signature Scheme from Pairings 一种新的基于对的盲签名和阈值盲签名方案
Wei Cui, Yang Xin, Yixian Yang, Xinxin Niu
{"title":"A New Blind Signature and Threshold Blind Signature Scheme from Pairings","authors":"Wei Cui, Yang Xin, Yixian Yang, Xinxin Niu","doi":"10.1109/CIS.WORKSHOPS.2007.140","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.140","url":null,"abstract":"An efficient provably secure identity-based blind signature (IBBS) scheme based on bilinear pairings is proposed. Assuming the intractability of the q-Strong Diffie-Hellman problem, our IBBS is unforgeable under adaptive chosen-message and ID attack. Because of avoiding using the inefficient MapToPoint function, our IBBS can offer advantages in runtime over the schemes available. Based on this ID-based blind signature scheme, we describe the first ID-based threshold blind signature (TBS) and show that it has security properties of unforgeability and robustness.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Models for Predicting the Value of E-Commerce Trade in China 中国电子商务贸易价值预测模型
Min Liu, Shudong Sun
{"title":"Models for Predicting the Value of E-Commerce Trade in China","authors":"Min Liu, Shudong Sun","doi":"10.1109/CIS.WORKSHOPS.2007.156","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.156","url":null,"abstract":"In the literature review, few studies exist, which predict the value of e-commerce. The study establishes models for predicting the value of e-commerce trade in China by use of main statistical indicators and data in Statistical Report on the Internet Development in China released by CNNIC Firstly, factors affecting e- commerce trade value in China and their relation with e-commerce trade value are analyzed. Secondly, models for predicting the future of the factors are proposed. Finally, The combined model is constructed to predict the value of e-commerce in China in the near future, and is proved to be satisfied because the prediction results are close to related statistics released by authority organizations recently.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Algorithm for the Longest Common Subsequence Problem 一种求解最长公共子序列问题的新算法
Xuyu Xiang, Dafang Zhang, Jiaohua Qin
{"title":"A New Algorithm for the Longest Common Subsequence Problem","authors":"Xuyu Xiang, Dafang Zhang, Jiaohua Qin","doi":"10.1109/CIS.WORKSHOPS.2007.209","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.209","url":null,"abstract":"In order to find the longest common subsequence (LCS) as soon as possible, we, with the method of match pairs, propose the new algorithm of the sequence of DNA, which is efficient both in time and in space on the basis of the improved dynamic programming theorem.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Competitive Stock Replenishment Problem in a Two-Echelon Supply Chain with Competing Retailers 具有竞争零售商的两级供应链中的竞争性库存补充问题
Qing Liu, Dao Huang, He Liu, Yu Tian
{"title":"Competitive Stock Replenishment Problem in a Two-Echelon Supply Chain with Competing Retailers","authors":"Qing Liu, Dao Huang, He Liu, Yu Tian","doi":"10.1109/CIS.WORKSHOPS.2007.132","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.132","url":null,"abstract":"This paper studies a two-echelon supply chain, with a warehouse and n retailers. The entire supply chain is characterized by several parameters including demand variance, inventory holding cost and backorder penalty cost. We investigate replenishment strategies of this system under decentralized and centralized control. We consider horizontal information sharing between these retailers when the shared information is valuable for stabilization of the system. It is shown that unique Nash equilibrium of the competitive retailers system exists. We also propose demand-depended and equational coordination schemes. These three coordination schemes are compared numerically, the result of the simulation show that penalty cost and holding cost effect replenishment in Nash equilibrium greatly, and although the set of strategies under profit oriented Nash equilibrium balance the supply chain system, it increases system cost.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121848264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Based Fault Diagnosis for the Spacecraft Power System 基于模型的航天器动力系统故障诊断
Shao Jiye, Wang Rixin, Xu Minqiang, Gao Jingbo
{"title":"Model-Based Fault Diagnosis for the Spacecraft Power System","authors":"Shao Jiye, Wang Rixin, Xu Minqiang, Gao Jingbo","doi":"10.1109/CIS.WORKSHOPS.2007.48","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.48","url":null,"abstract":"Model-based diagnosis has a great advantage compared to other diagnostic methods. This paper develops a fault diagnosis system for the power system of spacecraft using model-based consistent diagnostic theory. Designing the nominal and faulty modes of each component, the qualitative model of the power system is built in a component-based manner using JMPL language. The fault diagnostic engine is constructed using conflict-A* algorithm. Experiments on the spacecraft power system verify that the model of the power system is correct and the diagnosis system developed is very effectively.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation 基于Elgamal签名方程的盲签名方案安全性分析
Yu Baozheng, Xu Congwei
{"title":"Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation","authors":"Yu Baozheng, Xu Congwei","doi":"10.1109/CIS.WORKSHOPS.2007.81","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.81","url":null,"abstract":"Universal forgery attacks and selected forgery attacks on both weak and strong blind signature schemes based on Elgamal signature equation proposed by Wang et al. are developed. Without using any secret key, anyone can forge a valid signature through selecting some random parameters. The possibility of forging the blind schemes is analyzed and moreover, an improved weak blind signature scheme and an improved strong blind signature scheme are designed. Also, the securities of the improved blind signatures are analyzed.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Three-Dimensional Encoding Genetic Algorithm for Job Shop Scheduling 作业车间调度的三维编码遗传算法
H. Yin, En-Liang Hu, Yongming Wang, Nan-Feng Xiao, Yanrong Jiang
{"title":"A Three-Dimensional Encoding Genetic Algorithm for Job Shop Scheduling","authors":"H. Yin, En-Liang Hu, Yongming Wang, Nan-Feng Xiao, Yanrong Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.107","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.107","url":null,"abstract":"In so many combinatorial optimization problems, job shop scheduling problems have earned a reputation for being difficult to solve. GA has demonstrated considerable success in providing efficient solutions to many non-polynomial-hard optimization problems. In the field of job shop scheduling, GA has been intensively researched, and there are nine kinds of methods were proposed to encoding chromosome to represent a solution. In this paper, we proposed a novel genetic chromosome encoding approach, in this encoding method, the operation of crossover and mutation was done in three-dimensional coded space. 5 selected benchmark problems were tried with the proposed three- dimensional encoding GA for validation and the results are encouraging.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Specification of Access Control Policies for Web Services Web服务访问控制策略规范
Miao Liu, W. Zhang, Hua Liu
{"title":"Specification of Access Control Policies for Web Services","authors":"Miao Liu, W. Zhang, Hua Liu","doi":"10.1109/CIS.WORKSHOPS.2007.34","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.34","url":null,"abstract":"In this paper we design an access control policy language WSACPL for web services. The WSACPL language is comprised of the WSACPL policy ontology, and includes a mechanism to induce SWRL language to express access control rules. The paper also brings up the method to compute authorization results of composite processes in OWLS. On the analysis of cause and kinds of policy conflicts, the paper represents the method to resolve conflicts among WSACPL policies.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"14 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stereoscopic Video Coding Based on H.264 Standard 基于H.264标准的立体视频编码
Shigang Wang, Xuejun Wang
{"title":"Stereoscopic Video Coding Based on H.264 Standard","authors":"Shigang Wang, Xuejun Wang","doi":"10.1109/CIS.WORKSHOPS.2007.32","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.32","url":null,"abstract":"H.264 is an advanced video compression standard absorbing the advantages of the previous standard. In this paper, block-based stereoscopic video coding is presented. The main view of the sequences is encoded as a H.264 bitstream and the auxiliary views are encoded by joint motion and disparity compensation, so that both temporal and spatial redundancy are reduced and high compression is achieved. Investigating the effectiveness of the joint motion and disparity vectors estimation as well as the employing of the H.264 encoder optimizes the whole framework.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Schema of Automated Design Security Protocols 一种自动设计安全协议的模式
HaiFeng Xue, Huanguo Zhang, S. Qing
{"title":"A Schema of Automated Design Security Protocols","authors":"HaiFeng Xue, Huanguo Zhang, S. Qing","doi":"10.1109/CIS.WORKSHOPS.2007.97","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.97","url":null,"abstract":"This paper proposes a novel approach to automated design of security protocols using artificial immune algorithm based on cord calculs. Designing security protocol is notoriously difficult and error- prone. Artificial immune algorithm is a powerfully intelligent algorithm. The cord calculus is applied to the artificial immune algorithm to instruct the search and compose of security protocols. Automated design of security protocols using artificial immune algorithm can alleviate people's burden of manually design security protocols and get more security and reliable protocols.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信