2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
Design Principles for Public Key Cryptography System Protected with Power Analysis 具有功率分析保护的公钥密码系统设计原则
Xu Rui, Huiping Jiang, B. Sheng
{"title":"Design Principles for Public Key Cryptography System Protected with Power Analysis","authors":"Xu Rui, Huiping Jiang, B. Sheng","doi":"10.1109/CIS.WORKSHOPS.2007.229","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.229","url":null,"abstract":"Side channel information could be used to analysis the key information according to leakage information depending on the operation of cryptography algorithm and its hardware. And power analysis is the chief method. In this paper, an improved architecture for RSA system against power analysis was proposed based on its basic theory. A DPA attack for RSA specially, is discussed in details, and the shadow technology was proposed based on it. In order to maximize the capability/cost. Shadow technique and removing intermediate value technique are introduced into RSA system, which only cost more than 30% timing to realizing secure RSA algorithm. Contemporary the effectiveness of advanced RSA cryptography system was illuminate briefly.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Particle Swarm Optimizer with Chaotic Self-Feedback for Global Optimization of Multimodal Functions 多模态函数全局优化的混沌自反馈粒子群优化器
Zhang Hui-dang, He Yuyao
{"title":"A Particle Swarm Optimizer with Chaotic Self-Feedback for Global Optimization of Multimodal Functions","authors":"Zhang Hui-dang, He Yuyao","doi":"10.1109/CIS.WORKSHOPS.2007.142","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.142","url":null,"abstract":"This paper proposes an improved particle swarm optimization utilizing iterative chaotic map with infinite collapses (ICMIC) perturbations (ICMICPSO) for global optimization of multimodal functions. The chaotic perturbation generated by the ICMIC is incorporated into the particle's velocity updating rule to make the particles have a larger potential space to fly. With the coefficient of chaotic perturbation decaying, the dynamics of ICMICPSO algorithm is a chaotic dynamics first and then a steepest descent dynamics. The proposed ICMICPSO method as hybrid optimization is tested on several widely used multimodal functions. Numerical results are compared with that of some other chaotic PSO methods available in the usual literature. The performance studies demonstrate that the effectiveness and efficiency of the proposed ICMICPSO approach are comparably to or better than that of the other CPSO variants in this paper.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131585100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Malicious Witness Reports in Multi-agent Systems 在多代理系统中检测恶意见证报告
Xing Maolin, Li Bin, Wu Xingshen
{"title":"Detecting Malicious Witness Reports in Multi-agent Systems","authors":"Xing Maolin, Li Bin, Wu Xingshen","doi":"10.1109/CIS.WORKSHOPS.2007.190","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.190","url":null,"abstract":"In open Multi-agent Systems, trust plays the central role in facilitating interactions. Most of trust models need to collect the witness reports, and they may suffer due to existence of malicious witness. To detect the malicious witness reports, this paper presents an approach, OSM (Opinion Similarity Measure). Evaluator calculates the opinion similarity state (OSS) between evaluator and witness according to their reports, and evaluates the witness credibility according to the OSS between them. Experiment and analysis show that OSM is more robust than existing approaches.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Watermarking 3D Meshes Based on Fixed Spectral Basis 基于固定谱基的三维网格水印
Tao Xu, Yanning Zhang, Jinqiu Sun, Zenggang Lin
{"title":"Watermarking 3D Meshes Based on Fixed Spectral Basis","authors":"Tao Xu, Yanning Zhang, Jinqiu Sun, Zenggang Lin","doi":"10.1109/CIS.WORKSHOPS.2007.114","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.114","url":null,"abstract":"Watermarking 3D meshes in transformed domain by using traditional Laplacian matrix decomposing may become unstable, since the valence of meshes may be different. To solve this problem, the proposed watermarking algorithm produced fixed spectral basis by using the dual graph derived from the mesh topology and projected geometric features of the dual graph onto fixed spectral basis. In order to resist similar transforming, a geometric invariant vector was chose as watermark covering data. Watermarking signal was hided into low frequency coefficients by their linear relations. Original mesh data were not needed when extracting watermark. The proposed algorithm can resist translating, rotating, uniformed scaling, and also have robustness against mesh geometry compressing, adding noise with low intensity.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Targets Detection and Tracking Based on Nonlinear Adaptive Filtering 基于非线性自适应滤波的运动目标检测与跟踪
Wang Ying-li, Dai Jing-min
{"title":"Moving Targets Detection and Tracking Based on Nonlinear Adaptive Filtering","authors":"Wang Ying-li, Dai Jing-min","doi":"10.1109/CIS.WORKSHOPS.2007.232","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.232","url":null,"abstract":"To resolve the problem of the missile detection in the space early-warning process, an efficient method based on nonlinear adaptive filtering is proposed to detect the small IR target of low SNR under the complex background in this paper. The method can eliminate the influence of the unbalance background to the image segmentation, select the small moving target and the noise points and then eliminate wrong point targets to obtain the satisfactory detection result. The effectiveness of the method is proved by the experimental results for several infrared image sequences.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Assembly Evolutionary Algorithm for n-Queens Problem 一种求解n-Queens问题的装配进化算法
Congwen Zeng, T. Gu
{"title":"A Novel Assembly Evolutionary Algorithm for n-Queens Problem","authors":"Congwen Zeng, T. Gu","doi":"10.1109/CIS.WORKSHOPS.2007.102","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.102","url":null,"abstract":"Individuals in nowadays evolutionary algorithms for n-queens problem do not satisfy some basic constraint conditions. Motivated by self-assembly computing, a novel assembly evolutionary algorithm for n-queens problem is presented. Each individual is made up of assembly-parts, assembly-seeds and status information. Some important notions and rules regarding the novel assembly evolutionary algorithm are discussed. Experimental results show that the algorithm finds a solution faster than other latest evolutionary algorithms.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dissymmetrical P2P Topology and Resource Locating Algorithm 非对称P2P拓扑及资源定位算法
Yang Jing, He Liang
{"title":"Dissymmetrical P2P Topology and Resource Locating Algorithm","authors":"Yang Jing, He Liang","doi":"10.1109/CIS.WORKSHOPS.2007.67","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.67","url":null,"abstract":"The paper proposes a dissymmetrical and pure P2P topology based on K-ary-tree architecture named DSKTree topology, with the view of \"node symmetrical characteristic\", it can solve the unstable and linearly increasing scale problem in existing resource sharing application using pure P2P topology. We also design resource locating algorithm in DSKTree topology. The performance analysis shows that it can optimize the cost of locating and lower the impact to performance of pure P2P topology while the scale of the system increases.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116494154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AOP-Based J2EE Source Code Protection 基于aop的J2EE源代码保护
Xiufeng Zhang, Q. Wen
{"title":"AOP-Based J2EE Source Code Protection","authors":"Xiufeng Zhang, Q. Wen","doi":"10.1109/CIS.WORKSHOPS.2007.181","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.181","url":null,"abstract":"Encryption has become the mainstream to protect Java source code. However, there are defects, one of which is it cannot protect J2EE applications efficiently. This paper firstly analyses the problems encountered when applying this technology to protect J2EE applications, then resolves these problems using AOP technology, and thereby enlarges the range of encryption to protect Java source code.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Mining for Web Business Intelligence Platform and Its Sequence Knowledge Model 面向Web商业智能平台的知识挖掘及其序列知识模型
Shen Jie, Wei Liu-hua, He Kun, Xu Fa-yan, Bi Lei, Sun Rong-shuang
{"title":"Knowledge Mining for Web Business Intelligence Platform and Its Sequence Knowledge Model","authors":"Shen Jie, Wei Liu-hua, He Kun, Xu Fa-yan, Bi Lei, Sun Rong-shuang","doi":"10.1109/CIS.WORKSHOPS.2007.137","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.137","url":null,"abstract":"The ever-changing market information makes the traditional information collection and the way for using it unfitted for enterprises' business requirements. Knowledge mining for Web business intelligence (KB4WBI) platform is put forward in this paper, and online Web knowledge acquisition and knowledge semantics management are realized. Since Web business information has evident time effectiveness and context-related characteristic, great emphasis is placed on the research of Web sequence knowledge representation model of ontology evolution. Compared to the current methods, this platform comprehensively considers the real time characteristic and semantic attributions of Web knowledge, improves the knowledge precision and utility, and lays the basis of Web business intelligence.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128307495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UCGS: A Usage Control Approach for Grid Services UCGS:网格服务的使用控制方法
Yiduo Mei, Xiaoshe Dong, Weiguo Wu, Shangyuan Guan, Jing Xu
{"title":"UCGS: A Usage Control Approach for Grid Services","authors":"Yiduo Mei, Xiaoshe Dong, Weiguo Wu, Shangyuan Guan, Jing Xu","doi":"10.1109/CIS.WORKSHOPS.2007.198","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.198","url":null,"abstract":"The dynamic and multi-institutional nature of the grid environments introduces challenging security issues that demand new technical approaches. But traditional access control models consider static authorization decisions based on subjects'pre-assigned permissions on target objects and focus on a closed system, therefore, they are not suitable for the dynamic grid environments. To address the above problems, we propose UCGS, a novel usage control approach for grid services. Our approach is inspired by the usage control model (UCON). UCGS improves the security of the grid services by employing a continuous usage control of the grid services, monitoring the behavior of the subjects. It enables richer and finer-grained control over authorization and usage of grid services and resources than that of traditional access control models. \"Blacklist\", \"unilateral contract\" and \"arbitrator\" are introduced in UCGS to guarantee that a subject can not deny its obligations after service is complete, which contributes to maintain the normal order of the grid environments and the security and interests of the service providers.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信