The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
The following topics are dealt with: data hiding techniques; wavelet transform; management information system; image sequence compressing algorithm; trusted software; case-based reasoning system; education information platform; UML; multiobjective optimization; information retrieval; web mining; CUDA architecture; fuzzy association rules; BP neural network; network security detection method; adaptive...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the...
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
The features of terms in Cryptology are analyzed. A method of automatic term extraction based on extension of central strings is addressed, in view of linguistic and statistical characteristics. Experimental results indicate that in contrast to common methods, the velocity of extraction in the proposed method is improved as well as precision and receivable recall. When applied to Ontology learning...
This paper proposes an image combination algorithm of active and passive security protection. The algorithm is realized by adjusting the passive protection information embedding algorithm according to active Arnold transform's periodicity. By means of this algorithm, the passive protection information can be extracted conveniently from the image's ciphertext without decoding and it still exists in...
Random number generation methods are subjected to numerous researches in various fields such as cryptography. In this research, statistical quality of a few million digits of binary expansion of some irrational numbers has been tested through dozen of standard tests developed for random and pseudorandom number generators. The results indicate that digits of binary expansion of these numbers can be...
Note that network coding allows immediate nodes to mix information from different data flows. On the basis of this observation, we prove that under suitable conditions, communicators can communicate with perfect secrecy over wiretap networks. Our method of secure communication over wiretap networks without keys is fundamentally distinct from cryptographic means. Furthermore, a linear network code...
The need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. Proving ownership rights on outsourced relational databases is a crucial issue in today's Internet-based application environments and in many content distribution...
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the...
Wormhole attack is a severe threat against wireless ad hoc and sensor networks. It can be launched without compromising any legitimate node or cryptographic mechanisms, and often serves as a stepping stone for many serious attacks. Most existing countermeasures often make critical assumptions or require specialized hardware devices in the network. Those assumptions and requirements limit the applicability...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
One of the current trends in cryptography is to search for new approaches to the cryptographic algorithms design. One such possibility is to use the other algebraic structures, such as a quasigroup, rather than the traditional. Quasigroups are equivalent to more familiar Latin squares. One of quasigroups' important properties is that all possible elements of certain quasigroup occur with equal probability...
This paper presents an originally encryption system implemented on a structure of hybrid additive programmable cellular automata (HAPCA). As the development of cellular automata (CA) applications is generally an experimental effort, the research implies the exploration through simulation of the huge space of cellular automata local rules and global states. The encryption and decryption modules are...
The large-scale communication of multimedia data on Internet motivates the protection of digital information against illegal duplication and manipulation. Advances that facilitate electronic publishing and commerce also heighten threats of intellectual property theft and unlawful tampering. This work is concerned with the perceptual models used for data protection, secrete communication, author's...
Data De-duplication has become a commodity component in data-intensive storage systems. But compared with other traditional storage paradigms, de-duplication system achieves elimination of data duplications or redundancies at the cost of bringing several additional layers or function components into the I/O path, and these additional components are either CPU-intensive or I/O intensive, largely hindering...
Privacy is an important issue in data mining and knowledge discovery due to the increase in sharing of sensitive data through networks among business, governments and other parties. Data collection is a necessary step in data mining process. Due to privacy reasons, collecting data from different parties becomes difficult. Privacy concerns may prevent the parties from directly sharing the data and...
Current authentications with a secret key are based on the Challenge-Response paradigm. This mechanism avoids the clear transmission of the password in the network. Most protocols in Internet applications integrate this mechanism to authenticate a client before providing a service. Unfortunately this method in the protocol design increases the protocolar exchanges. This contribution is equivalent...
In this paper, a novel audio steganography method is proposed. In this algorithm, first embedding threshold in the time domain is estimated. Then this threshold is used for data concealment in the time domain. The performance of the proposed scheme in terms of SNR (signal to noise ratio) and BER (bit error rate) is analyzed. An estimation formula that connects SNR with embedding threshold has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.