首页 > 最新文献

2008 International Conference on Information Security and Assurance (isa 2008)最新文献

英文 中文
An Inter-Classes Obfuscation Method for Java Program Java程序的类间混淆方法
Xuesong Zhang, Fengling He, Wanli Zuo
Software is a valuable form of data, representing significant intellectual property, and reverse engineering of software code by competitors may reveal important technological secrets. This problem becomes more serious when facing with the platform independent language - Java byte code. We introduce an inter-classes software obfuscation technique which extracts the codes of some methods in user-defined classes and embeds them into some other object's methods in the object pool. Since all objects in the object pool are upcast to their common base type, which object's method will really execute can only be ascertained at runtime. Thus, drastically obscured the program flow. Combined with some enhanced mechanisms, this technique can even resist to dynamic analysis to a certain extent. Experimental result shows that there is little influence to the execution efficiency.
软件是一种有价值的数据形式,代表着重要的知识产权,竞争对手对软件代码进行逆向工程可能会泄露重要的技术秘密。当面对与平台无关的语言——Java字节码时,这个问题变得更加严重。介绍了一种类间软件混淆技术,该技术将自定义类中某些方法的代码提取出来,并嵌入到对象池中其他对象的方法中。由于对象池中的所有对象都向上转换为它们的公共基类型,因此只有在运行时才能确定哪个对象的方法将真正执行。因此,极大地模糊了程序流程。结合一些增强的机制,该技术甚至可以在一定程度上抵抗动态分析。实验结果表明,对执行效率影响不大。
{"title":"An Inter-Classes Obfuscation Method for Java Program","authors":"Xuesong Zhang, Fengling He, Wanli Zuo","doi":"10.1109/ISA.2008.49","DOIUrl":"https://doi.org/10.1109/ISA.2008.49","url":null,"abstract":"Software is a valuable form of data, representing significant intellectual property, and reverse engineering of software code by competitors may reveal important technological secrets. This problem becomes more serious when facing with the platform independent language - Java byte code. We introduce an inter-classes software obfuscation technique which extracts the codes of some methods in user-defined classes and embeds them into some other object's methods in the object pool. Since all objects in the object pool are upcast to their common base type, which object's method will really execute can only be ascertained at runtime. Thus, drastically obscured the program flow. Combined with some enhanced mechanisms, this technique can even resist to dynamic analysis to a certain extent. Experimental result shows that there is little influence to the execution efficiency.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improvement of a Fingerprint-Based Remote User Authentication Scheme 基于指纹的远程用户认证方案的改进
Jing Xu, W. Zhu, Deng-guo Feng
Password authentication has been adopted as one of the most commonly used solutions in network environments to protect resources from unauthorized access. Recently, Khan et al. proposed an efficient fingerprint-based remote user authentication scheme with smart cards, in which a password/verification table is not required on the remote server, and users are allowed to choose and update their passwords freely. In this paper, we show that their scheme is vulnerable to the parallel session attack. Furthermore, their scheme is susceptible to the impersonation attack provided that the information stored in the smart card is disclosed by an adversary. We also propose an improved scheme which is immune to the presented attacks.
密码认证已成为网络环境中最常用的解决方案之一,以保护资源免受未经授权的访问。最近,Khan等人提出了一种高效的基于指纹的智能卡远程用户认证方案,该方案不需要在远程服务器上设置密码/验证表,允许用户自由选择和更新密码。在本文中,我们证明了他们的方案容易受到并行会话攻击。此外,如果存储在智能卡中的信息被对手泄露,他们的方案很容易受到冒充攻击。我们还提出了一种改进的方案,该方案对所提出的攻击免疫。
{"title":"Improvement of a Fingerprint-Based Remote User Authentication Scheme","authors":"Jing Xu, W. Zhu, Deng-guo Feng","doi":"10.1109/ISA.2008.62","DOIUrl":"https://doi.org/10.1109/ISA.2008.62","url":null,"abstract":"Password authentication has been adopted as one of the most commonly used solutions in network environments to protect resources from unauthorized access. Recently, Khan et al. proposed an efficient fingerprint-based remote user authentication scheme with smart cards, in which a password/verification table is not required on the remote server, and users are allowed to choose and update their passwords freely. In this paper, we show that their scheme is vulnerable to the parallel session attack. Furthermore, their scheme is susceptible to the impersonation attack provided that the information stored in the smart card is disclosed by an adversary. We also propose an improved scheme which is immune to the presented attacks.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege 基于最小权限的Linux安全增强实现与自动测试
Gaoshou Zhai, Jie Zeng, Miaoxia Ma, L. Zhang
Nowadays, technologies of information security have been attached more and more importance to and it's a critical problem to take measures to ensure the reliability of related trustworthy software such as secure operating systems (SOSs). Thereafter, it's always necessary for such systems to be taken complete and rigorous security test and evaluation among development team and/or by third-party security certification organization. However, such software testing is usually time consuming, cost consuming and boresome and thus technologies of software testing automation have alluring application foreground in that field. In this paper, methods and technologies about how to test a SOS automatically are discussed in breadth and in depth at first. Then least privilege is studied and the corresponding modules of security enhancement are added to Linux based on Linux Kernel Modules (LKM). Finally, a prototype of automatic security testing as to such least privilege mechanism is implemented and the results are analyzed.
在信息安全技术日益受到重视的今天,如何采取措施保证安全操作系统等相关可信软件的可靠性已成为一个关键问题。因此,开发团队和/或第三方安全认证机构总是需要对此类系统进行完整而严格的安全测试和评估。然而,此类软件测试通常耗时、耗钱且乏味,因此软件测试自动化技术在该领域具有诱人的应用前景。本文首先从广度和深度上探讨了SOS自动测试的方法和技术。然后研究了最小权限,并在Linux内核模块(LKM)的基础上增加了相应的安全增强模块。最后,实现了针对最小特权机制的自动安全测试原型,并对测试结果进行了分析。
{"title":"Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege","authors":"Gaoshou Zhai, Jie Zeng, Miaoxia Ma, L. Zhang","doi":"10.1109/ISA.2008.61","DOIUrl":"https://doi.org/10.1109/ISA.2008.61","url":null,"abstract":"Nowadays, technologies of information security have been attached more and more importance to and it's a critical problem to take measures to ensure the reliability of related trustworthy software such as secure operating systems (SOSs). Thereafter, it's always necessary for such systems to be taken complete and rigorous security test and evaluation among development team and/or by third-party security certification organization. However, such software testing is usually time consuming, cost consuming and boresome and thus technologies of software testing automation have alluring application foreground in that field. In this paper, methods and technologies about how to test a SOS automatically are discussed in breadth and in depth at first. Then least privilege is studied and the corresponding modules of security enhancement are added to Linux based on Linux Kernel Modules (LKM). Finally, a prototype of automatic security testing as to such least privilege mechanism is implemented and the results are analyzed.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":" 38","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120831063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Revision of Security Proof on f-OAEP f-OAEP安全证明的修订
Jie Liu, Gongliang Chen, Jianhua Li
OAEP is widely accepted because of its provable security and practicability. However, there was a twist in the security proof in the random oracle model. Shoup revealed a flaw in the original security proof by Bellare and Rogaway. In this paper, a revision of the security proof is presented to fix the flaw. Furthermore, compared with some existing improved prove methods, the revised proof is applicable for the underlying trapdoor permutation being a general case.
OAEP因其可验证的安全性和实用性而被广泛接受。然而,在随机oracle模型的安全性证明中有一个转折。Shoup在Bellare和Rogaway的原始安全证明中发现了一个漏洞。本文提出了一种改进的安全证明来弥补这一缺陷。此外,与现有的一些改进证明方法相比,修正证明作为一般情况适用于底层陷门排列。
{"title":"Revision of Security Proof on f-OAEP","authors":"Jie Liu, Gongliang Chen, Jianhua Li","doi":"10.1109/ISA.2008.38","DOIUrl":"https://doi.org/10.1109/ISA.2008.38","url":null,"abstract":"OAEP is widely accepted because of its provable security and practicability. However, there was a twist in the security proof in the random oracle model. Shoup revealed a flaw in the original security proof by Bellare and Rogaway. In this paper, a revision of the security proof is presented to fix the flaw. Furthermore, compared with some existing improved prove methods, the revised proof is applicable for the underlying trapdoor permutation being a general case.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web Metering Scheme for Fair Advertisement Transactions 公平广告交易的网上计量计划
Ren-Chiun Wang, Wen-Shenq Juang, C. Lei
Since the rapid development of the Internet, many advertisers would want to introduce their goods on Web sites. For achieving fair network advertisement payment, a payment system may need to evaluate the number of visited clients for particular Web pages. However, advertisers fear that Web servers inflate the number of metering. Also, Web servers fear to receive a forged witness from a client. If one of the above situations happened, the payment of network advertisement is unfair. In this paper, we propose a user-efficient and fair Web metering scheme for ubiquitous environments, where clients can use various intelligent devices to obtain their desired services at any time and any place.
由于因特网的迅速发展,许多广告商都想在网站上介绍他们的商品。为了实现公平的网络广告付费,付费系统可能需要评估访问特定网页的客户数量。然而,广告商担心网络服务器会增加计量的数量。此外,Web服务器害怕从客户端收到伪造的证人。如果发生上述情况之一,网络广告的支付是不公平的。在本文中,我们提出了一种用户高效和公平的Web计量方案,适用于无处不在的环境,在这种环境中,客户可以随时随地使用各种智能设备来获得他们想要的服务。
{"title":"A Web Metering Scheme for Fair Advertisement Transactions","authors":"Ren-Chiun Wang, Wen-Shenq Juang, C. Lei","doi":"10.1109/ISA.2008.48","DOIUrl":"https://doi.org/10.1109/ISA.2008.48","url":null,"abstract":"Since the rapid development of the Internet, many advertisers would want to introduce their goods on Web sites. For achieving fair network advertisement payment, a payment system may need to evaluate the number of visited clients for particular Web pages. However, advertisers fear that Web servers inflate the number of metering. Also, Web servers fear to receive a forged witness from a client. If one of the above situations happened, the payment of network advertisement is unfair. In this paper, we propose a user-efficient and fair Web metering scheme for ubiquitous environments, where clients can use various intelligent devices to obtain their desired services at any time and any place.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129762963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics 基于马尔可夫链的数字取证网络犯罪分析模型
Do Do Kim, H. In
Recognizing links between offender patterns is one of the most crucial skills of an investigator. Early recognition of similar patterns can lead to focusing resources, improving clearance rates, and ultimately saving lives in terms of digital forensics. In this paper we propose a forensics methodology using Markov chain during a given time interval for tracking and predicting the degree of criminal activity as it evolves over time. In other words, we describe intrusion scenario, and classify profiling of user's behavior by prior probability based Markov chain. Also, we apply the noise page elimination algorithm (NPEA) to reduce an error of probability prediction. Finally, we have experiment our model on dataset and have analysis their accuracy by Monte Carlo simulation.
识别罪犯模式之间的联系是调查人员最重要的技能之一。早期识别类似的模式可以集中资源,提高清除率,并最终在数字取证方面挽救生命。在本文中,我们提出了一种取证方法,使用马尔可夫链在给定的时间间隔内跟踪和预测犯罪活动的程度,因为它随着时间的推移而演变。换句话说,我们描述入侵场景,并根据基于先验概率的马尔可夫链对用户行为进行分类分析。此外,我们还应用了噪声页消除算法(NPEA)来减少概率预测的误差。最后,我们在数据集上进行了实验,并通过蒙特卡罗仿真分析了模型的精度。
{"title":"Cyber Criminal Activity Analysis Models using Markov Chain for Digital Forensics","authors":"Do Do Kim, H. In","doi":"10.1109/ISA.2008.90","DOIUrl":"https://doi.org/10.1109/ISA.2008.90","url":null,"abstract":"Recognizing links between offender patterns is one of the most crucial skills of an investigator. Early recognition of similar patterns can lead to focusing resources, improving clearance rates, and ultimately saving lives in terms of digital forensics. In this paper we propose a forensics methodology using Markov chain during a given time interval for tracking and predicting the degree of criminal activity as it evolves over time. In other words, we describe intrusion scenario, and classify profiling of user's behavior by prior probability based Markov chain. Also, we apply the noise page elimination algorithm (NPEA) to reduce an error of probability prediction. Finally, we have experiment our model on dataset and have analysis their accuracy by Monte Carlo simulation.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Software Dependability Testing Profile in Internet Environment 互联网环境下软件可靠性测试方法研究
Changjie Ma, J. Zhao, Guochang Gu, X. Ma
In Internet environment, software needs to be tested sufficiently before it is considered dependable. The operational profile based testing is an efficient way for both the reliability testing and the security testing. In practice, the two kinds of testing are often carried out separately to validate the dependability of the software, but it is resources consuming to develop the operational profile and security intrusion profile. In this paper, the feasibilities and the benefits of the idea of taking the dependability testing are given. Since the testing profile is often different from the operational profile with the influence of the security testing, a description method of the testing profile is needed. A brief analysis of the description of operational profile is made, and on the base of the extended operational profile, the method to describe the dependability testing profile is proposed.
在互联网环境下,软件需要经过充分的测试才能被认为是可靠的。基于操作轮廓的测试是一种有效的可靠性测试和安全性测试方法。在实践中,这两种类型的测试通常是分开进行的,以验证软件的可靠性,但是开发操作概要和安全入侵概要是消耗资源的。本文给出了进行可靠性测试的可行性和好处。由于受安全性测试的影响,测试概要文件通常与操作概要文件不同,因此需要一种测试概要文件的描述方法。简要分析了运行剖面的描述,在扩展运行剖面的基础上,提出了可靠性测试剖面的描述方法。
{"title":"Research on Software Dependability Testing Profile in Internet Environment","authors":"Changjie Ma, J. Zhao, Guochang Gu, X. Ma","doi":"10.1109/ISA.2008.20","DOIUrl":"https://doi.org/10.1109/ISA.2008.20","url":null,"abstract":"In Internet environment, software needs to be tested sufficiently before it is considered dependable. The operational profile based testing is an efficient way for both the reliability testing and the security testing. In practice, the two kinds of testing are often carried out separately to validate the dependability of the software, but it is resources consuming to develop the operational profile and security intrusion profile. In this paper, the feasibilities and the benefits of the idea of taking the dependability testing are given. Since the testing profile is often different from the operational profile with the influence of the security testing, a description method of the testing profile is needed. A brief analysis of the description of operational profile is made, and on the base of the extended operational profile, the method to describe the dependability testing profile is proposed.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection SYN Flooding Attacks Using Fuzzy Logic 利用模糊逻辑检测SYN泛洪攻击
T. Tuncer, Y. Tatar
Denial of Service attacks are one of the major type of problems in the computer network security. Because they include many other type of attacks they are one of the most frequently used attack methods.. In general, DoS attacks are used to block access to the computer networks or personal computers. SYN flooding attack is the most widespread of the DoS attacks. In these attacks normal SYN packets can not be distinguished from the SYN attack packets. In this paper, we propose a fuzzy logic based system for detecting SYN flooding attacks. Performance of the proposed system has been compared with Cumulative Sum (CUSUM) algorithm. The simulation results show that the proposed system has better performance for low and high intensity attacks than the CUSUM algorithm.
拒绝服务攻击是计算机网络安全中的主要问题之一。因为它们包括许多其他类型的攻击,所以它们是最常用的攻击方法之一。一般来说,DoS攻击用于阻止对计算机网络或个人计算机的访问。SYN泛洪攻击是DoS攻击中分布最广的一种。在这些攻击中,无法区分正常的SYN报文和SYN攻击报文。本文提出了一种基于模糊逻辑的SYN泛洪攻击检测系统。将该系统的性能与累积和(CUSUM)算法进行了比较。仿真结果表明,与CUSUM算法相比,该算法在低强度和高强度攻击下都具有更好的性能。
{"title":"Detection SYN Flooding Attacks Using Fuzzy Logic","authors":"T. Tuncer, Y. Tatar","doi":"10.1109/ISA.2008.50","DOIUrl":"https://doi.org/10.1109/ISA.2008.50","url":null,"abstract":"Denial of Service attacks are one of the major type of problems in the computer network security. Because they include many other type of attacks they are one of the most frequently used attack methods.. In general, DoS attacks are used to block access to the computer networks or personal computers. SYN flooding attack is the most widespread of the DoS attacks. In these attacks normal SYN packets can not be distinguished from the SYN attack packets. In this paper, we propose a fuzzy logic based system for detecting SYN flooding attacks. Performance of the proposed system has been compared with Cumulative Sum (CUSUM) algorithm. The simulation results show that the proposed system has better performance for low and high intensity attacks than the CUSUM algorithm.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122320361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Security Research on WiMAX with Neural Cryptography 基于神经密码的WiMAX安全研究
Dong Hu, Yuyan Wang
The paper gives an overview of the security issue on WiMAX, which is a new and hot research point for telecommunication and computer scientist. In the IEEE 802.11 technology, security was added later while IEEE 802.16 considered the security issues during the design of the protocol. However, security mechanism of the IEEE 802.16 still remains a question. WiMAX is relatively a new technology and does not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. We also discuss how to apply neural cryptography at WiMAX application in the end.
本文对WiMAX的安全问题进行了概述,这是电信和计算机科学家研究的一个新的热点。在IEEE 802.11技术中,安全性是后来才加入的,而IEEE 802.16在协议设计时就考虑了安全问题。然而,IEEE 802.16的安全机制仍然是一个问题。WiMAX是一项相对较新的技术,并没有广泛部署,以证明在实际情况下存在威胁、风险和脆弱性的证据。最后讨论了如何在WiMAX应用中应用神经密码技术。
{"title":"Security Research on WiMAX with Neural Cryptography","authors":"Dong Hu, Yuyan Wang","doi":"10.1109/ISA.2008.17","DOIUrl":"https://doi.org/10.1109/ISA.2008.17","url":null,"abstract":"The paper gives an overview of the security issue on WiMAX, which is a new and hot research point for telecommunication and computer scientist. In the IEEE 802.11 technology, security was added later while IEEE 802.16 considered the security issues during the design of the protocol. However, security mechanism of the IEEE 802.16 still remains a question. WiMAX is relatively a new technology and does not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. We also discuss how to apply neural cryptography at WiMAX application in the end.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation 一种新的电子通信技术——VT位置码通信技术及其实现
S.Y. Zhou, G.H. Qin, Y. Jin
Now computer and electronic device technology has been monopolized by binary system, not only unable to break through the existing technology bottleneck, but bring a lot of potential safety problems. Aiming at this question, a new electronic communication technology is presented in this paper. The technology quantifies the time axis and the voltage axis synchronously, uses the quantified time dot as the address of the communication, and realizes the transmission of the multi-system [1] data via transmitting the multi-steps voltage quantification. The technology solves the bottleneck problem of the speed, circuit and electromagnetism in the electronic communication, changes the binary system coding mode and communication connection form of the electronic device, reduces the transmission quantity of the redundant information, advances the security of electronic system and network, debases the complexity of the devices connection, enhances the rate of the processing and the transmission, simplifies the transformation between the difference protocols. The experimental results approve the validity and the robustness of the technology.
现在计算机和电子设备技术已经被二进制系统所垄断,不仅无法突破现有的技术瓶颈,而且带来了许多潜在的安全问题。针对这一问题,本文提出了一种新的电子通信技术。该技术将时间轴和电压轴同步量化,以量化后的时间点作为通信地址,通过传输多步电压量化实现多系统[1]数据的传输。该技术解决了电子通信中的速度、电路和电磁瓶颈问题,改变了电子设备的二进制编码方式和通信连接形式,减少了冗余信息的传输量,提高了电子系统和网络的安全性,降低了设备连接的复杂性,提高了处理和传输的速度。简化了不同协议之间的转换。实验结果验证了该技术的有效性和鲁棒性。
{"title":"A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation","authors":"S.Y. Zhou, G.H. Qin, Y. Jin","doi":"10.1109/ISA.2008.43","DOIUrl":"https://doi.org/10.1109/ISA.2008.43","url":null,"abstract":"Now computer and electronic device technology has been monopolized by binary system, not only unable to break through the existing technology bottleneck, but bring a lot of potential safety problems. Aiming at this question, a new electronic communication technology is presented in this paper. The technology quantifies the time axis and the voltage axis synchronously, uses the quantified time dot as the address of the communication, and realizes the transmission of the multi-system [1] data via transmitting the multi-steps voltage quantification. The technology solves the bottleneck problem of the speed, circuit and electromagnetism in the electronic communication, changes the binary system coding mode and communication connection form of the electronic device, reduces the transmission quantity of the redundant information, advances the security of electronic system and network, debases the complexity of the devices connection, enhances the rate of the processing and the transmission, simplifies the transformation between the difference protocols. The experimental results approve the validity and the robustness of the technology.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 International Conference on Information Security and Assurance (isa 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1