首页 > 最新文献

2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

英文 中文
Reconfigurable Galois Field multiplier 可重构伽罗瓦场倍增器
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013104
Rong-Jian Chen, Jhen-Wun Fan, Chin-Hao Liao
Galois Field has received a lot of attention because of their important and particular applications in cryptography, channel coding, etc. This paper presents the Reconfigurable Galois Field multiplier used to calculate the Galois field multiplication of different lengths which consists of AND gates and special cells. The special cell makes multiplier architecture easier to extend and calculate arbitrarily length multiplication. The Reconfigurable Galois Field multiplier only uses combinational logic circuits which have been implemented on Xilinx FPGA. The results prove that this work has better performances than other previous similar works.
伽罗瓦场由于其在密码学、信道编码等领域的重要而特殊的应用而受到了广泛的关注。本文提出了一种可重构伽罗瓦场乘法器,用于计算不同长度的伽罗瓦场乘法,该乘法器由与门和特殊单元组成。特殊的单元使乘法器结构更容易扩展和计算任意长度的乘法。可重构伽罗瓦场乘法器仅使用已在赛灵思FPGA上实现的组合逻辑电路。结果表明,该工作比以往的同类工作具有更好的性能。
{"title":"Reconfigurable Galois Field multiplier","authors":"Rong-Jian Chen, Jhen-Wun Fan, Chin-Hao Liao","doi":"10.1109/ISBAST.2014.7013104","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013104","url":null,"abstract":"Galois Field has received a lot of attention because of their important and particular applications in cryptography, channel coding, etc. This paper presents the Reconfigurable Galois Field multiplier used to calculate the Galois field multiplication of different lengths which consists of AND gates and special cells. The special cell makes multiplier architecture easier to extend and calculate arbitrarily length multiplication. The Reconfigurable Galois Field multiplier only uses combinational logic circuits which have been implemented on Xilinx FPGA. The results prove that this work has better performances than other previous similar works.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Push-based XML access control policy languages: A review 基于推送的XML访问控制策略语言:综述
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013118
W. Halboob, A. Mamat, R. Mahmod
Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. This paper investigates the scalability of the current XML-based policy languages. It starts by introducing the well-known general access control models with more focus on their scalability. Then, the XML-based policy languages are presented followed by evaluating their management and system scalability. This paper founds that there is a need for using decentralized trusted management concept for addressing the scalability issue in XML access control. Also, using IBE will help in providing several access control features as temporal and delegable access.
已经提出了几种访问控制策略语言,用于为基于推送的XML访问控制系统指定访问控制策略。本文研究了当前基于xml的策略语言的可扩展性。本文首先介绍了众所周知的通用访问控制模型,并重点介绍了它们的可伸缩性。然后,介绍了基于xml的策略语言,然后评估了它们的管理和系统可伸缩性。本文发现有必要使用分散可信管理概念来解决XML访问控制中的可伸缩性问题。此外,使用IBE将有助于提供一些访问控制特性,如临时访问和可委托访问。
{"title":"Push-based XML access control policy languages: A review","authors":"W. Halboob, A. Mamat, R. Mahmod","doi":"10.1109/ISBAST.2014.7013118","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013118","url":null,"abstract":"Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. This paper investigates the scalability of the current XML-based policy languages. It starts by introducing the well-known general access control models with more focus on their scalability. Then, the XML-based policy languages are presented followed by evaluating their management and system scalability. This paper founds that there is a need for using decentralized trusted management concept for addressing the scalability issue in XML access control. Also, using IBE will help in providing several access control features as temporal and delegable access.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards adapting metamodelling technique for database forensics investigation domain 元建模技术在数据库取证调查领域的应用
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013142
Arafat Al-dhaqm, S. H. Othman, S. Razak, Md. Asri Ngadi
Threats which come from database insiders or database outsiders have formed a big challenge to the protection of integrity and confidentiality in many database systems. To overcome this situation a new domain called a Database Forensic (DBF) has been introduced to specifically investigate these dynamic threats which have posed many problems in Database Management Systems (DBMS) of many organizations. DBF is a process to identify, collect, preserve, analyse, reconstruct and document all digital evidences caused by this challenge. However, until today, this domain is still lacks having a standard and generic knowledge base for its forensic investigation methods / tools due to many issues and challenges in its complex processes. Therefore, this paper will reveal an approach adapted from a software engineering domain called metamodelling which will unify these DBF complex knowledge processes into an artifact, a metamodel (DBF Metamodel). In future, the DBF Metamodel could benefit many DBF investigation users such as database investigators, stockholders, and other forensic teams in offering various possible solutions for their problem domain.
来自数据库内部或外部的威胁对数据库系统的完整性和机密性的保护构成了巨大的挑战。为了克服这种情况,引入了一个名为数据库取证(DBF)的新领域,专门研究这些在许多组织的数据库管理系统(DBMS)中造成许多问题的动态威胁。DBF是一个识别、收集、保存、分析、重建和记录由这一挑战引起的所有数字证据的过程。然而,直到今天,由于其复杂的过程中存在许多问题和挑战,该领域仍然缺乏一个标准和通用的法医调查方法/工具知识库。因此,本文将揭示一种来自软件工程领域的方法,称为元建模,它将这些DBF复杂的知识过程统一到一个工件,一个元模型(DBF元模型)。将来,DBF元模型可以为许多DBF调查用户(如数据库调查人员、股东和其他取证团队)提供各种可能的解决方案,从而使他们受益。
{"title":"Towards adapting metamodelling technique for database forensics investigation domain","authors":"Arafat Al-dhaqm, S. H. Othman, S. Razak, Md. Asri Ngadi","doi":"10.1109/ISBAST.2014.7013142","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013142","url":null,"abstract":"Threats which come from database insiders or database outsiders have formed a big challenge to the protection of integrity and confidentiality in many database systems. To overcome this situation a new domain called a Database Forensic (DBF) has been introduced to specifically investigate these dynamic threats which have posed many problems in Database Management Systems (DBMS) of many organizations. DBF is a process to identify, collect, preserve, analyse, reconstruct and document all digital evidences caused by this challenge. However, until today, this domain is still lacks having a standard and generic knowledge base for its forensic investigation methods / tools due to many issues and challenges in its complex processes. Therefore, this paper will reveal an approach adapted from a software engineering domain called metamodelling which will unify these DBF complex knowledge processes into an artifact, a metamodel (DBF Metamodel). In future, the DBF Metamodel could benefit many DBF investigation users such as database investigators, stockholders, and other forensic teams in offering various possible solutions for their problem domain.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Data integrity and privacy model in cloud computing 云计算中的数据完整性和隐私模型
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013135
Mohammed Faez Al-Jaberi, A. Zainal
Cloud computing is the future of computing industry and it is believed to be the next generation of computing technology. Among the major concern in cloud computing is data integrity and privacy. Clients require their data to be safe and private from any tampering or unauthorized access. Various algorithms and protocols (MD5, AES, and RSA-based PHE) are implemented by the various components of this model to provide the maximum levels of integrity management and privacy preservation for data stored in public cloud such as Amazon S3. The impact of algorithms and protocols, used to ensure data integrity and privacy, is studied to test the performance of the proposed model. The prototype system showed that data integrity and privacy are ensured against unauthorized parties. This model reduces the burden of checking the integrity of data stored in cloud storage by utilizing a third party, integrity checking service, and applies security mechanism that ensure privacy and confidentiality of data stored in cloud computing. This paper proposes an architecture based model that provides data integrity verification and privacy preserving in cloud computing.
云计算是计算产业的未来,被认为是下一代计算技术。云计算的主要关注点之一是数据完整性和隐私。客户要求他们的数据是安全和隐私的,不受任何篡改或未经授权的访问。该模型的各个组件实现了各种算法和协议(MD5、AES和基于rsa的PHE),为存储在公共云(如Amazon S3)中的数据提供最高级别的完整性管理和隐私保护。研究了用于确保数据完整性和隐私的算法和协议的影响,以测试所提出模型的性能。原型系统表明,数据完整性和隐私性得到了保证,不受未经授权方的侵害。该模型利用第三方完整性检查服务,减轻了对云存储中存储数据完整性检查的负担,并应用安全机制,确保云计算中存储数据的隐私性和机密性。提出了一种基于体系结构的云计算数据完整性验证和隐私保护模型。
{"title":"Data integrity and privacy model in cloud computing","authors":"Mohammed Faez Al-Jaberi, A. Zainal","doi":"10.1109/ISBAST.2014.7013135","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013135","url":null,"abstract":"Cloud computing is the future of computing industry and it is believed to be the next generation of computing technology. Among the major concern in cloud computing is data integrity and privacy. Clients require their data to be safe and private from any tampering or unauthorized access. Various algorithms and protocols (MD5, AES, and RSA-based PHE) are implemented by the various components of this model to provide the maximum levels of integrity management and privacy preservation for data stored in public cloud such as Amazon S3. The impact of algorithms and protocols, used to ensure data integrity and privacy, is studied to test the performance of the proposed model. The prototype system showed that data integrity and privacy are ensured against unauthorized parties. This model reduces the burden of checking the integrity of data stored in cloud storage by utilizing a third party, integrity checking service, and applies security mechanism that ensure privacy and confidentiality of data stored in cloud computing. This paper proposes an architecture based model that provides data integrity verification and privacy preserving in cloud computing.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Notes on “a password-based remote user authentication scheme without smart card” 关于“基于密码而无需智能卡的远程用户认证方案”的说明
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013105
S. Kumari, M. Khan, Xiong Li, Rahul Kumar
Recently, Chen et al. proposed a remote user authentication scheme for non-tamper-proof storage devices like Universal Serial Bus (USB) stick. A little later, He et al. found that Chen et al.'s scheme suffers from device stolen attack, insider attack and lack of forward secrecy. He et al. improved the scheme by Chen et al. by presenting another scheme. Nonetheless, we detect some security problems in the scheme by He et al.. We show that He et al.'s scheme is vulnerable to off-line password guessing attack. Besides, an attacker can not only impersonate the user impersonation but can also establish a session key with the server, as a result, the scheme lacks proper mutual authentication. Further, the scheme does not protect user's privacy and a user cannot freely change his password at his will as password updating requires interaction with the server.
最近,Chen等人提出了一种针对非防篡改存储设备(如USB)的远程用户认证方案。不久之后,He等人发现Chen等人的方案存在设备窃取攻击、内部攻击和前向保密不足的问题。He等人改进了Chen等人的方案,提出了另一种方案。尽管如此,我们还是发现了He等人在方案中存在的一些安全问题。我们证明了He等人的方案容易受到离线密码猜测攻击。此外,攻击者不仅可以模仿用户的模仿,还可以与服务器建立会话密钥,导致该方案缺乏适当的相互认证。此外,该方案不保护用户的隐私,用户不能随意更改密码,因为密码更新需要与服务器进行交互。
{"title":"Notes on “a password-based remote user authentication scheme without smart card”","authors":"S. Kumari, M. Khan, Xiong Li, Rahul Kumar","doi":"10.1109/ISBAST.2014.7013105","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013105","url":null,"abstract":"Recently, Chen et al. proposed a remote user authentication scheme for non-tamper-proof storage devices like Universal Serial Bus (USB) stick. A little later, He et al. found that Chen et al.'s scheme suffers from device stolen attack, insider attack and lack of forward secrecy. He et al. improved the scheme by Chen et al. by presenting another scheme. Nonetheless, we detect some security problems in the scheme by He et al.. We show that He et al.'s scheme is vulnerable to off-line password guessing attack. Besides, an attacker can not only impersonate the user impersonation but can also establish a session key with the server, as a result, the scheme lacks proper mutual authentication. Further, the scheme does not protect user's privacy and a user cannot freely change his password at his will as password updating requires interaction with the server.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of a robust smart card authentication scheme for multi-server architecture 多服务器架构下健壮智能卡认证方案的密码分析
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013106
Xiong Li, M. Khan, S. Kumari, Junguo Liao, W. Liang
User authentication is an important security issue for network based services. Multi-server authentication scheme resolves the repeated registration problem of single-server authentication scenario where the user has to register at different servers to access different types of network services. Recently, Pippal et al. proposed a smart card authentication scheme for multi-server architecture. They claimed that their scheme has some advantages and can resist kinds of attacks. In this paper, we analyze the weaknesses of Pippal et al.'s scheme, and point out that their scheme cannot provide correct authentication, cannot resist impersonation attack, stolen smart card attack, and insider attack. Besides, their scheme is non-extensible when a new server added into the system.
用户身份验证是基于网络的服务的一个重要安全问题。多服务器认证方案解决了单服务器认证场景下用户需要在不同的服务器上注册才能访问不同类型的网络服务的重复注册问题。最近,Pippal等人提出了一种多服务器架构的智能卡认证方案。他们声称他们的方案有一些优点,可以抵抗各种攻击。本文分析了Pippal等人的方案的缺点,指出其方案不能提供正确的身份验证,不能抵抗冒充攻击、被盗智能卡攻击和内部攻击。此外,当向系统中添加新服务器时,它们的方案是不可扩展的。
{"title":"Cryptanalysis of a robust smart card authentication scheme for multi-server architecture","authors":"Xiong Li, M. Khan, S. Kumari, Junguo Liao, W. Liang","doi":"10.1109/ISBAST.2014.7013106","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013106","url":null,"abstract":"User authentication is an important security issue for network based services. Multi-server authentication scheme resolves the repeated registration problem of single-server authentication scenario where the user has to register at different servers to access different types of network services. Recently, Pippal et al. proposed a smart card authentication scheme for multi-server architecture. They claimed that their scheme has some advantages and can resist kinds of attacks. In this paper, we analyze the weaknesses of Pippal et al.'s scheme, and point out that their scheme cannot provide correct authentication, cannot resist impersonation attack, stolen smart card attack, and insider attack. Besides, their scheme is non-extensible when a new server added into the system.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks 针对基于http的DoS和DDoS攻击的保护框架的最佳规范
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013132
M. Saleh, A. Manaf
Nowadays, the most distinct threat to the web applications is HTTP-based Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, which it causes a massive damage to them and corrupt their works completely. Up to now, various researches are accomplished in this field for the sake of identifying and determining the most convenientrequired specifications for a protective solution that helps to protect web applications from HTTP-based DoS and DDoS attacks. Unfortunately, despite of that,the optimal specifications of the protective solution have not been identified, and therefore this paper comes out to state and identify these missing specifications. In this paper, a comprehensive survey to all sorts of HTTP-based DoS and DDoS attacks is conducted in order to figure out and identify the optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks.
目前,对web应用程序最明显的威胁是基于http的拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击,这对web应用程序造成了巨大的损害,并完全破坏了它们的工作。到目前为止,为了识别和确定最方便的保护方案所需的规范,以帮助保护web应用程序免受基于http的DoS和DDoS攻击,在这一领域完成了各种研究。不幸的是,尽管如此,保护解决方案的最佳规格尚未确定,因此本文提出并确定这些缺失的规格。本文对各种基于http的DoS和DDoS攻击进行了全面的调查,以找出和确定针对基于http的DoS和DDoS攻击的保护框架的最佳规范。
{"title":"Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks","authors":"M. Saleh, A. Manaf","doi":"10.1109/ISBAST.2014.7013132","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013132","url":null,"abstract":"Nowadays, the most distinct threat to the web applications is HTTP-based Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, which it causes a massive damage to them and corrupt their works completely. Up to now, various researches are accomplished in this field for the sake of identifying and determining the most convenientrequired specifications for a protective solution that helps to protect web applications from HTTP-based DoS and DDoS attacks. Unfortunately, despite of that,the optimal specifications of the protective solution have not been identified, and therefore this paper comes out to state and identify these missing specifications. In this paper, a comprehensive survey to all sorts of HTTP-based DoS and DDoS attacks is conducted in order to figure out and identify the optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126703042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Interactive educational tool for teaching a simple cipher 交互式教育工具,教一个简单的密码
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013102
A. Farra, E. Zahedi
In this paper, a practical educational tool based on Java programming is described. The approach is based on using a fully interactive graphical user interface for teaching cipher algorithms. As an example, a transposition cipher is covered, where students can try different keys and observe the effect of parameters such as key length, choice of letters for the key on the ciphertext. At the same time, the process of breaking the cipher algorithm (cryptanalysis) is rendered possible by students injecting known plaintext. The developed program offers an option where it tries systematically all keys (brute force) to break the cipher. Being extendable, the platform is thought to be able to play a very positive role in the assimilation of abstract concepts encountered during cryptography.
本文介绍了一种基于Java编程的实用教学工具。该方法基于使用完全交互式的图形用户界面来教授密码算法。以一个换位密码为例,学生可以尝试不同的密钥,并观察密钥长度、密钥字母的选择等参数对密文的影响。同时,通过学生注入已知的明文,破解密码算法(密码分析)的过程成为可能。开发的程序提供了一个选项,它系统地尝试所有密钥(暴力破解)来破解密码。由于具有可扩展性,该平台被认为能够在吸收加密过程中遇到的抽象概念方面发挥非常积极的作用。
{"title":"Interactive educational tool for teaching a simple cipher","authors":"A. Farra, E. Zahedi","doi":"10.1109/ISBAST.2014.7013102","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013102","url":null,"abstract":"In this paper, a practical educational tool based on Java programming is described. The approach is based on using a fully interactive graphical user interface for teaching cipher algorithms. As an example, a transposition cipher is covered, where students can try different keys and observe the effect of parameters such as key length, choice of letters for the key on the ciphertext. At the same time, the process of breaking the cipher algorithm (cryptanalysis) is rendered possible by students injecting known plaintext. The developed program offers an option where it tries systematically all keys (brute force) to break the cipher. Being extendable, the platform is thought to be able to play a very positive role in the assimilation of abstract concepts encountered during cryptography.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings 新的安全的基于身份和无证书的认证密钥协议协议,没有对
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013119
S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari
Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of Identity-Based and Certificateless cryptosystems have been published. The pairing-free Key Agreement protocols could improve the efficiency by eliminating the high expense of pairing maps. In this paper, we proposed several secure and efficient Identity-Based and Certificateless pairing-free two party Key Agreement protocols. In compare with related works, our protocols require less computational cost.
最近,在基于身份和无证书的密码系统中,已经发布了各种基于配对和无配对的双方密钥协议。无配对密钥协议可以通过消除配对映射的高开销来提高效率。本文提出了几种安全高效的基于身份和无证书、无配对的双方密钥协议。与相关工作相比,我们的协议需要更少的计算成本。
{"title":"New secure identity-based and certificateless authenticated Key Agreement protocols without pairings","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013119","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013119","url":null,"abstract":"Recently, various pairing-based and pairing-free two party Key Agreement protocols in the context of Identity-Based and Certificateless cryptosystems have been published. The pairing-free Key Agreement protocols could improve the efficiency by eliminating the high expense of pairing maps. In this paper, we proposed several secure and efficient Identity-Based and Certificateless pairing-free two party Key Agreement protocols. In compare with related works, our protocols require less computational cost.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132566858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification I-Filter:用于加速恶意软件变体分类的相同结构化控制流字符串过滤器
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013126
Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyungoh Park
As the number of malware variants has grown rapidly, classification speed has become crucial in security issues. While several techniques for malware variant classification have been proposed, they involve a speed-accuracy trade-off. In an attempt to achieve a speedy and accurate malware variant classification, we thoroughly analyze previously proposed methods and identify a critical performance bottleneck in string-to-string matching. This paper presents and evaluates a technique called I-Filter that enhances the performance of the previous approach, approximate matching. I-Filter has the following novel mechanism, the hash-based equivalent procedure matching technique. Our performance evaluation confirms that a performance improvement of on average 1,043 times through I-Filtering.
随着恶意软件变种数量的迅速增长,分类速度在安全问题中变得至关重要。虽然已经提出了几种恶意软件变体分类技术,但它们都涉及速度和准确性的权衡。为了实现快速准确的恶意软件变体分类,我们彻底分析了以前提出的方法,并确定了字符串到字符串匹配的关键性能瓶颈。本文提出并评估了一种称为I-Filter的技术,该技术提高了先前方法的性能,即近似匹配。I-Filter具有以下新颖的机制,基于哈希的等效过程匹配技术。我们的性能评估证实,通过I-Filtering,性能平均提高了1,043倍。
{"title":"I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification","authors":"Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyungoh Park","doi":"10.1109/ISBAST.2014.7013126","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013126","url":null,"abstract":"As the number of malware variants has grown rapidly, classification speed has become crucial in security issues. While several techniques for malware variant classification have been proposed, they involve a speed-accuracy trade-off. In an attempt to achieve a speedy and accurate malware variant classification, we thoroughly analyze previously proposed methods and identify a critical performance bottleneck in string-to-string matching. This paper presents and evaluates a technique called I-Filter that enhances the performance of the previous approach, approximate matching. I-Filter has the following novel mechanism, the hash-based equivalent procedure matching technique. Our performance evaluation confirms that a performance improvement of on average 1,043 times through I-Filtering.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1