2010 International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
Essence of Two-Dimensional Principal Component Analysis 二维主成分分析的本质
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.67
Caikou Chen, Jingyu Yangzhou
{"title":"Essence of Two-Dimensional Principal Component Analysis","authors":"Caikou Chen, Jingyu Yangzhou","doi":"10.1109/CIS.2010.67","DOIUrl":"https://doi.org/10.1109/CIS.2010.67","url":null,"abstract":"The technique of two-dimensional principal component analysis (2DPCA) is analyzed and its essence is revealed. The image total scatter matrix of 2DPCA is in nature equivalent to the sum of all total scatter matrices of m training subsets in which the kth subset is formed by the kth line of each of all training images, where m is the number of lines contained in an image. Based on this result, the true reason why 2DPCA outperforms PCA is uncovered, i.e., different from the traditional PCA using only global information of images, 2DPCA combines the local and global information of images simultaneously and alternative more transparent and understandable 2DPCA algorithm is developed. Finally, some relations to PCA and MPCA and 2DPCA are shown.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Weight Design in Multi-objective Evolutionary Algorithm 多目标进化算法中一种新的权值设计
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.37
Fangqing Gu, Hai-Lin Liu
{"title":"A Novel Weight Design in Multi-objective Evolutionary Algorithm","authors":"Fangqing Gu, Hai-Lin Liu","doi":"10.1109/CIS.2010.37","DOIUrl":"https://doi.org/10.1109/CIS.2010.37","url":null,"abstract":"This paper presents a method to improve the performance of MOEA/D. The idea is to approximate the Pareto front(PF) by using a linear interpolation of the non-dominant solutions. It propose a novel weight design method for multi-objective evolutionary algorithm. Even when the PF is complex, we can obtain the Pareto optimal solutions which are distributed uniformly over the PF. Some test functions are constructed to compare the performance of the proposed algorithm with that of MOEA/D. The results indicate that the proposed algorithm could significantly outperform MOEA/D on these test instances.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123183608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Secure Communication Model of WSN Based on Secret Sharing 基于秘密共享的WSN安全通信模型
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.111
Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li
{"title":"Secure Communication Model of WSN Based on Secret Sharing","authors":"Xiaohui Zhao, Liaojun Pang, Jingjuan Bi, Qingqi Pei, Huixian Li","doi":"10.1109/CIS.2010.111","DOIUrl":"https://doi.org/10.1109/CIS.2010.111","url":null,"abstract":"In order to solve the problems in wireless sensor networks, such as node failure and losing of master key, a secure communication model based on secret sharing in wireless sensor networks is presented in this paper. In this model, with the secret sharing mechanism, the master key is divided into n parts which are distributed to the council nodes. Accordingly the council nodes can protect the master key, distribute keys to the nodes in the domain, periodically monitor the key node to avoid failure and improve the date output rate.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114971147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proxy Re-encryption from CLE to CBE 从CLE到CBE的代理重加密
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.79
Ping Wei, Xu An Wang, Xiaoyuan Yang
{"title":"Proxy Re-encryption from CLE to CBE","authors":"Ping Wei, Xu An Wang, Xiaoyuan Yang","doi":"10.1109/CIS.2010.79","DOIUrl":"https://doi.org/10.1109/CIS.2010.79","url":null,"abstract":"In 1998, Blaze, Bleumer, and Strauss propose a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opene under Bob’s decryption key. In 2007, mainly motivated b making different types of ciphertext circulate smoothly in the network, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE (Certificate Based Public Key Encryption) to IBE (Identity Based Encryption), IBE to IBE, IBE to CBE, CBE to CBE. In this paper, we extend Matsuo’s research on proxy re-encryption to the certificate less public key encryption setting. We propose the first proxy re-encryption scheme from certificate less public key encryption (CLE) to certificate based public key encryption (CBE) and evaluate its security.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117113840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Sheme of Mobile Platform Based on Trusted Computing 基于可信计算的移动平台方案
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.154
Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao
{"title":"A Sheme of Mobile Platform Based on Trusted Computing","authors":"Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao","doi":"10.1109/CIS.2010.154","DOIUrl":"https://doi.org/10.1109/CIS.2010.154","url":null,"abstract":"Mobile platform is the foundation to protect the security of mobile application. How to design and implement the trusted and effective mobile platform is the problem need to be resolved. On the basis of comprehensive study of trusted computing technology and the threats to 3G network, the architecture of trusted mobile platform based on mobile trusted module is proposed, and. a predicate logic based formal analysis method is also proposed by which the defective of secure boot is analyzed and the improve process of secure boot is presented. The results of analysis show that the architecture and secure boot is more feasible, secure.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic Modeling: Computational Models of the Concepts 语义建模:概念的计算模型
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.16
Viacheslav Wolfengagen
{"title":"Semantic Modeling: Computational Models of the Concepts","authors":"Viacheslav Wolfengagen","doi":"10.1109/CIS.2010.16","DOIUrl":"https://doi.org/10.1109/CIS.2010.16","url":null,"abstract":"As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment. Computing takes the enabling of such a model which corresponds to a 'theory'. The parameters of the model are systematically changing and correspond to 'entries' for the inputs. The parameterized family of its 'behaviors' is used as the 'outputs' of the model. These -- being computed, -- behaviors are matched with the real behavior of the problem domain object under the real inputs -- prototypes of model inputs. In case of conclusion that the model satisfactory reflects the features of the real object-prototype, then the real experiment can be replaced by the computational one, which is executed using the model-image.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Naive Feature Selection Method and Its Application in Network Intrusion Detection 一种朴素特征选择方法及其在网络入侵检测中的应用
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.96
Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang
{"title":"A Naive Feature Selection Method and Its Application in Network Intrusion Detection","authors":"Tieming Chen, Xiaoming Pan, Yiguang Xuan, Jixia Ma, Jie Jiang","doi":"10.1109/CIS.2010.96","DOIUrl":"https://doi.org/10.1109/CIS.2010.96","url":null,"abstract":"Network intrusion detection system needs to handle huge data selected from network environments which usually contain lots of irrelevant or redundant features. It makes intrusion detection with high resource consumption, as well as results in poor performance of real-time processing and intrusion detection rate. Without loss of generality, feature selection can effectively improve the classification model performance, study on the feature selection-based intrusion detection method is therefore very necessary. This paper proposes a simple and quick inconsistency-based feature selection method. Data inconsistency is firstly employed to find the optimal features, and the sequential forward search is then utilized to facilitate the selection of subset features. The tests on KDD99 benchmark data show that the proposed feature selection method can directly eliminate irrelevant and redundant features, without degenerating the classification performance. Furthermore, due to experiments, the intrusion detection performance using the proposed method is also a little advantageous than that with the general CFS method.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph 椭圆曲线密码的非邻接形式递推算法
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.91
Jing Zhang, Ping Wang
{"title":"Non-Adjacent Form Recursive Algorithm on Elliptic Curves Cryptograph","authors":"Jing Zhang, Ping Wang","doi":"10.1109/CIS.2010.91","DOIUrl":"https://doi.org/10.1109/CIS.2010.91","url":null,"abstract":"Multiplication of a point is the main operation in elliptic curves cryptography system. It is well-known this operation be expensive in time-consuming. we try to improve the computing efficiency of multiple point which will increase the efficiency of elliptic curves cryptograph. In order to reach this goal, on the basis of addition-subtraction method, we adopt recursive formula of double point to improve the efficiency of multiple points algorithm. By the improved algorithm, the efficiency of computing multiple point be improved greatly. The improved algorithm be more effective than addition-subtraction method.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identity Authentication Based on Fuzzy Vault and Digital Certificate 基于模糊保险库和数字证书的身份认证
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.102
Fen Li, QUAN LIU, Liaojun Pang, Qingqi Pei
{"title":"Identity Authentication Based on Fuzzy Vault and Digital Certificate","authors":"Fen Li, QUAN LIU, Liaojun Pang, Qingqi Pei","doi":"10.1109/CIS.2010.102","DOIUrl":"https://doi.org/10.1109/CIS.2010.102","url":null,"abstract":"Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to open the smart card and acquire the stored digital certificate with its private key by inputting his/her fingerprint. This scheme further perfects the safe authentication of PKI, and can be applied in the identity authentication of high-end user or the user with special safety requirement.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131007840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree Maiorana-McFarland定度弯曲函数的构造
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.157
Fengrong Zhang, Yu-pu Hu, Hua Ma, Min Xie
{"title":"Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree","authors":"Fengrong Zhang, Yu-pu Hu, Hua Ma, Min Xie","doi":"10.1109/CIS.2010.157","DOIUrl":"https://doi.org/10.1109/CIS.2010.157","url":null,"abstract":"A Boolean function with an even number $n=2k$ of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on the properties of Maiorana-McFarland's Bent functions, a Bent function with arbitrary degree can be constructed by changing the order of concatenating linear functions.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信