首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
Dynamic learning of automata from the call stack log for anomaly detection 从调用堆栈日志中动态学习自动机进行异常检测
Z. Liu, S. Bridges
Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal program behavior that can be used to detect intrusions that change application execution flow. The model (hybrid push down automaton, HPDA) incorporates call stack information and can be learned by dynamic analysis of training data captured from the call stack log. The learning algorithm uses call stack information maintained by the program to build a finite state automaton. When compared to other approaches including VtPath which also uses call stack information, the HPDA model produces a more compact and general representation of control flow, handles recursion naturally, can be learned with less training data, and has a lower false positive rate when used for anomaly detection. In addition, dynamic learning can also be used to supplement a model acquired from static analysis.
基于监视系统调用序列的异常检测已被证明是检测先前未知的程序攻击的有效方法。本文描述了一个分析正常程序行为的新模型,该模型可用于检测改变应用程序执行流的入侵。该模型(混合下推自动机,HPDA)包含调用堆栈信息,可以通过动态分析从调用堆栈日志中捕获的训练数据来学习。学习算法利用程序维护的调用栈信息构建有限状态自动机。与其他方法(包括同样使用调用堆栈信息的VtPath)相比,HPDA模型产生了更紧凑和通用的控制流表示,自然地处理递归,可以用更少的训练数据学习,并且在用于异常检测时具有更低的误报率。此外,动态学习也可以用来补充静态分析获得的模型。
{"title":"Dynamic learning of automata from the call stack log for anomaly detection","authors":"Z. Liu, S. Bridges","doi":"10.1109/ITCC.2005.136","DOIUrl":"https://doi.org/10.1109/ITCC.2005.136","url":null,"abstract":"Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal program behavior that can be used to detect intrusions that change application execution flow. The model (hybrid push down automaton, HPDA) incorporates call stack information and can be learned by dynamic analysis of training data captured from the call stack log. The learning algorithm uses call stack information maintained by the program to build a finite state automaton. When compared to other approaches including VtPath which also uses call stack information, the HPDA model produces a more compact and general representation of control flow, handles recursion naturally, can be learned with less training data, and has a lower false positive rate when used for anomaly detection. In addition, dynamic learning can also be used to supplement a model acquired from static analysis.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards an indoor location system using RF signal strength in IEEE 802.11 networks 在ieee802.11网络中使用射频信号强度的室内定位系统
A. Harder, Lanlan Song, Yu Wang
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.
位置是普适计算环境中最重要的上下文之一。GPS系统被广泛用于检测位置信息;他们主要在户外环境下工作。应用需要精确,易于构建和易于使用的室内定位系统。本文介绍了我们利用现有的IEEE 802.11无线网络实现基于microsoft - windows平台的室内位置确定系统的工作。该位置是根据从不同物理位置的多个基站收集的无线电信号强度信息确定的。实验结果表明,该方法具有较高的准确率。
{"title":"Towards an indoor location system using RF signal strength in IEEE 802.11 networks","authors":"A. Harder, Lanlan Song, Yu Wang","doi":"10.1109/ITCC.2005.278","DOIUrl":"https://doi.org/10.1109/ITCC.2005.278","url":null,"abstract":"Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"172 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Enhancing focused crawling with genetic algorithms 利用遗传算法增强集中爬行
Milad Shokouhi, P. Chubak, Zaynab Raeesy
Web crawlers are one of the most crucial components in search engines and their optimization would have a great effect on improving the searching efficiency. In this paper, we introduce an intelligent crawler called Gcrawler that uses a genetic algorithm for improving its crawling performance. Gcrawler estimates the best path for crawling on one hand and expands its initial keywords by using a genetic algorithm during the crawling on the other hand. This is the first crawler that acts intelligently without any relevance feedback or training. All the processes are online and there is no need for direct interaction with the users.
网络爬虫是搜索引擎中最重要的组成部分之一,对其进行优化对提高搜索效率有很大的影响。在本文中,我们介绍了一种名为Gcrawler的智能爬虫,它使用遗传算法来提高其爬行性能。Gcrawler一方面估计爬行的最佳路径,另一方面在爬行过程中使用遗传算法扩展初始关键字。这是第一个在没有任何相关反馈或训练的情况下智能行动的爬虫。所有的流程都是在线的,不需要与用户直接交互。
{"title":"Enhancing focused crawling with genetic algorithms","authors":"Milad Shokouhi, P. Chubak, Zaynab Raeesy","doi":"10.1109/ITCC.2005.145","DOIUrl":"https://doi.org/10.1109/ITCC.2005.145","url":null,"abstract":"Web crawlers are one of the most crucial components in search engines and their optimization would have a great effect on improving the searching efficiency. In this paper, we introduce an intelligent crawler called Gcrawler that uses a genetic algorithm for improving its crawling performance. Gcrawler estimates the best path for crawling on one hand and expands its initial keywords by using a genetic algorithm during the crawling on the other hand. This is the first crawler that acts intelligently without any relevance feedback or training. All the processes are online and there is no need for direct interaction with the users.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A mobile commerce framework based on Web services architecture 基于Web服务体系结构的移动商务框架
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
"Mobile Internet" arguably means more than just a new technique for communication; many analysts believe that it revolutionized the business world and innovate the way individuals live. This study concentrates on switching existing e-commerce applications from the wired Internet to the mobile Internet. Web services technologies are currently the most appropriate technologies to realize e-commerce applications. This study develops a mobile commerce application framework based on Web services technologies and mobile Internet functions. To investigate the feasibility of the proposed framework, an m-store implementation is deployed in a laboratory and simulated using HTTP transactions with secure sockets layer connections in a multi-user access environment. The minimum response time is stable (0.170 seconds for 5 users, 0.196 seconds for 50 users); the maximum throughput is invariable (0.365 Mbps for 5 users, 0.317 Mbps for 50 users), and the maximum transaction rate has little variation (5.882 per seconds for 5 users, 5.102 per seconds for 50 users). Results of this study demonstrate that the proposed framework is flexible, stable and scalable.
可以说,“移动互联网”不仅仅意味着一种新的通信技术;许多分析人士认为,它彻底改变了商业世界,革新了个人的生活方式。本研究的重点是将现有的电子商务应用从有线互联网转向移动互联网。Web服务技术是目前实现电子商务应用最合适的技术。本研究开发了一个基于Web服务技术和移动互联网功能的移动商务应用框架。为了研究所提出框架的可行性,在实验室中部署了m-store实现,并在多用户访问环境中使用带有安全套接字层连接的HTTP事务进行了模拟。最小响应时间稳定(5个用户0.170秒,50个用户0.196秒);最大吞吐量不变(5个用户为0.365 Mbps, 50个用户为0.317 Mbps),最大事务速率变化不大(5个用户为5.882每秒,50个用户为5.102每秒)。研究结果表明,该框架具有灵活性、稳定性和可扩展性。
{"title":"A mobile commerce framework based on Web services architecture","authors":"Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng","doi":"10.1109/ITCC.2005.16","DOIUrl":"https://doi.org/10.1109/ITCC.2005.16","url":null,"abstract":"\"Mobile Internet\" arguably means more than just a new technique for communication; many analysts believe that it revolutionized the business world and innovate the way individuals live. This study concentrates on switching existing e-commerce applications from the wired Internet to the mobile Internet. Web services technologies are currently the most appropriate technologies to realize e-commerce applications. This study develops a mobile commerce application framework based on Web services technologies and mobile Internet functions. To investigate the feasibility of the proposed framework, an m-store implementation is deployed in a laboratory and simulated using HTTP transactions with secure sockets layer connections in a multi-user access environment. The minimum response time is stable (0.170 seconds for 5 users, 0.196 seconds for 50 users); the maximum throughput is invariable (0.365 Mbps for 5 users, 0.317 Mbps for 50 users), and the maximum transaction rate has little variation (5.882 per seconds for 5 users, 5.102 per seconds for 50 users). Results of this study demonstrate that the proposed framework is flexible, stable and scalable.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An improved polling scheme for voice support in IEEE 802.11 wireless network 一种改进的ieee802.11无线网络语音支持轮询方案
Jun Zheng, E. Regentova
In this paper, we present a polling scheme, which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802.11 wireless networks. In this scheme, the access point (AP) of the basic service set (BSS) maintains two polling lists, i.e. the talking list and the silence list. Based on the talking status of the stations identified via silence detection, the two lists are dynamically adjusted by the AP. Temporary removal is applied to the stations in the silence list to further upgrade the performance. The conducted study based on simulation has shown that the proposed scheme is able to support more voice stations and has a lower packet loss rate compared to that obtained by four reference polling algorithms.
在本文中,我们提出了一种轮询方案,该方案允许在IEEE 802.11无线网络的点协调功能(PCF)中增加对语音通信的支持。在该方案中,基本服务集(BSS)的接入点(AP)维护两个轮询列表,即通话列表和沉默列表。AP根据静默检测识别出的站点的通话状态,对两个列表进行动态调整,对静默列表中的站点进行临时移除,进一步提升性能。基于仿真的研究表明,与四种参考轮询算法相比,该方案能够支持更多的语音站,并且丢包率更低。
{"title":"An improved polling scheme for voice support in IEEE 802.11 wireless network","authors":"Jun Zheng, E. Regentova","doi":"10.1109/ITCC.2005.80","DOIUrl":"https://doi.org/10.1109/ITCC.2005.80","url":null,"abstract":"In this paper, we present a polling scheme, which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802.11 wireless networks. In this scheme, the access point (AP) of the basic service set (BSS) maintains two polling lists, i.e. the talking list and the silence list. Based on the talking status of the stations identified via silence detection, the two lists are dynamically adjusted by the AP. Temporary removal is applied to the stations in the silence list to further upgrade the performance. The conducted study based on simulation has shown that the proposed scheme is able to support more voice stations and has a lower packet loss rate compared to that obtained by four reference polling algorithms.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VisDP: a Web service for visualizing design patterns on demand VisDP:用于按需可视化设计模式的Web服务
Jing Dong, Sheng Yang, Kang Zhang
Design patterns document good design solutions to a recurring problem in a particular context. They are typically modeled using UML. In practice, however, pattern-related information is lost when a design pattern is applied or composed because UML does not keep track of this information. Consequently, the designer cannot identify design patterns used in software system design diagrams. The benefits of design patterns are compromised because the designers cannot communicate with each other in terms of the design patterns they use and their design decisions and tradeoffs. In this paper, we present a Web service (VisDP) for explicitly visualizing design patterns in UML diagrams. This Web service is developed based on a UML profile containing new stereotypes, tagged values and constraints for visualizing design patterns in UML diagrams. With this service, the user is able to identify design patterns by moving the mouse and viewing color changes in UML diagrams. Additional pattern-related information can be dynamically displayed based on the mouse location.
设计模式记录了针对特定上下文中反复出现的问题的良好设计解决方案。它们通常使用UML建模。然而,在实践中,当应用或组合设计模式时,与模式相关的信息会丢失,因为UML不跟踪这些信息。因此,设计人员无法识别软件系统设计图中使用的设计模式。设计模式的好处受到了损害,因为设计人员不能就他们使用的设计模式以及他们的设计决策和权衡进行交流。在本文中,我们提供了一个Web服务(VisDP),用于在UML图中显式地可视化设计模式。此Web服务是基于UML概要文件开发的,该概要文件包含新的构造型、标记值和用于在UML图中可视化设计模式的约束。使用此服务,用户能够通过移动鼠标和查看UML图中的颜色变化来识别设计模式。可以根据鼠标位置动态显示其他与模式相关的信息。
{"title":"VisDP: a Web service for visualizing design patterns on demand","authors":"Jing Dong, Sheng Yang, Kang Zhang","doi":"10.1109/ITCC.2005.293","DOIUrl":"https://doi.org/10.1109/ITCC.2005.293","url":null,"abstract":"Design patterns document good design solutions to a recurring problem in a particular context. They are typically modeled using UML. In practice, however, pattern-related information is lost when a design pattern is applied or composed because UML does not keep track of this information. Consequently, the designer cannot identify design patterns used in software system design diagrams. The benefits of design patterns are compromised because the designers cannot communicate with each other in terms of the design patterns they use and their design decisions and tradeoffs. In this paper, we present a Web service (VisDP) for explicitly visualizing design patterns in UML diagrams. This Web service is developed based on a UML profile containing new stereotypes, tagged values and constraints for visualizing design patterns in UML diagrams. With this service, the user is able to identify design patterns by moving the mouse and viewing color changes in UML diagrams. Additional pattern-related information can be dynamically displayed based on the mouse location.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131132876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Need for incorporating a rule-based component in conventional object oriented systems 需要在传统的面向对象系统中合并基于规则的组件
Bhuwan Lodha, K. Dinesha, Pavan Kumar
System requirements, which define automatic behavior within a domain model, appear variously as business policies, engineering rules, domain laws, constraints, and state transitions. At first glance, such requirements seem easy to implement in the conventional object oriented (OO) space, but when looked closely, the most natural way of expressing such behavior is the rule based approach. Given a seamless bridge between the two paradigms, the combination not only provides ease of programming but also conceptual clarity at a higher level. In this paper, we consider the features of logic languages and their advantages in representation of various aforesaid system requirements. We look at the conventional three tier object oriented architecture and its advantage and disadvantages using different examples. We propose an optimum architecture that combines the best of both. We also apply the proposed architecture in the context of building highly configurable systems.
系统需求定义了领域模型中的自动行为,它们以各种方式出现,如业务策略、工程规则、领域法律、约束和状态转换。乍一看,这样的需求似乎很容易在传统的面向对象(OO)空间中实现,但是仔细观察就会发现,表达这种行为的最自然的方式是基于规则的方法。在两种范式之间建立了无缝的桥梁,这种组合不仅提供了编程的便利性,而且在更高的层次上提供了概念的清晰度。在本文中,我们考虑了逻辑语言的特点及其在表示上述各种系统需求方面的优势。我们通过不同的例子来研究传统的三层面向对象架构及其优缺点。我们提出了一个结合两者优点的最佳架构。我们还将提出的体系结构应用于构建高度可配置系统的上下文中。
{"title":"Need for incorporating a rule-based component in conventional object oriented systems","authors":"Bhuwan Lodha, K. Dinesha, Pavan Kumar","doi":"10.1109/ITCC.2005.209","DOIUrl":"https://doi.org/10.1109/ITCC.2005.209","url":null,"abstract":"System requirements, which define automatic behavior within a domain model, appear variously as business policies, engineering rules, domain laws, constraints, and state transitions. At first glance, such requirements seem easy to implement in the conventional object oriented (OO) space, but when looked closely, the most natural way of expressing such behavior is the rule based approach. Given a seamless bridge between the two paradigms, the combination not only provides ease of programming but also conceptual clarity at a higher level. In this paper, we consider the features of logic languages and their advantages in representation of various aforesaid system requirements. We look at the conventional three tier object oriented architecture and its advantage and disadvantages using different examples. We propose an optimum architecture that combines the best of both. We also apply the proposed architecture in the context of building highly configurable systems.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conversion and proxy functions for symmetric key ciphers 对称密钥密码的转换和代理函数
Debra L. Cook, A. Keromytis
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being closed under functional composition to a more general scenario where there exists a function that converts the ciphertext resulting from encryption under a specific key to the ciphertext corresponding to encryption with another key. We show how to perform such a conversion without exposing the plaintext. We discuss the tradeoff between the computational workload and security, and the relationship between such conversions and proxy cryptography. We conclude with a description of some practical applications of our results.
作为一般设计准则,对称密钥密码在功能组合下不应关闭,这将影响密码的安全性。然而,在某些情况下,这种特性是需要的,并且可以在不通过增加密码的计算工作量来降低密码的安全性的情况下获得。我们将对称密钥密码在功能组合下封闭的思想扩展到更一般的场景,其中存在一个函数,该函数将在特定密钥下加密产生的密文转换为与另一个密钥加密对应的密文。我们将展示如何在不暴露明文的情况下执行这样的转换。我们将讨论计算工作量和安全性之间的权衡,以及此类转换与代理加密之间的关系。最后,我们描述了我们的结果的一些实际应用。
{"title":"Conversion and proxy functions for symmetric key ciphers","authors":"Debra L. Cook, A. Keromytis","doi":"10.1109/ITCC.2005.115","DOIUrl":"https://doi.org/10.1109/ITCC.2005.115","url":null,"abstract":"As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being closed under functional composition to a more general scenario where there exists a function that converts the ciphertext resulting from encryption under a specific key to the ciphertext corresponding to encryption with another key. We show how to perform such a conversion without exposing the plaintext. We discuss the tradeoff between the computational workload and security, and the relationship between such conversions and proxy cryptography. We conclude with a description of some practical applications of our results.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Inversion-free arithmetic on genus 3 hyperelliptic curves and its implementations 属3超椭圆曲线的无反转算法及其实现
Xinxin Fan, T. Wollinger, Yumin Wang
Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, explicit formulae without using inversion for genus 3 HECC are given for the first time. When genus 3 HECC is defined over a prime field, our explicit formulae will cost respectively 122M + 9S, 105M + 8S and 110M + 11S to perform a group addition, mixed addition and doubling. If we use special genus 3 hyperelliptic curves with h(x) = 1 over a binary field, our explicit formulae will need only 119M + 9S, 102M + 8S and 42M + 15S for a group addition, mixed addition and doubling, respectively. In the second part of our contribution, we implement inversion-free arithmetic on genus 3 hyperelliptic curves defined over one prime field and three binary fields on a Pentium-M processor and compare the speed of explicit formulae in affine and projective coordinate system. The proposed explicit formulae show excellent performance on Pentium-M processors. We were able to get an increase in performance of over 40% compared to the affine coordinate case. Hence, our newly derived formulae are another step towards the use of HECC in practical applications.
近年来,人们对加速超椭圆曲线密码系统群运算的各种显式公式进行了大量的研究。本文首次给出了不使用反演的3属HECC的显式公式。当在素数域上定义属3 HECC时,我们的显式公式分别需要花费122M + 9S、105M + 8S和110M + 11S进行群加法、混合加法和加倍。如果我们在二元域上使用h(x) = 1的特殊格3超椭圆曲线,我们的显式公式将只需要119M + 9S, 102M + 8S和42M + 15S分别用于群加法,混合加法和加倍。在论文的第二部分,我们在Pentium-M处理器上实现了在一个素数域和三个二进制域上定义的格3超椭圆曲线的无反转算法,并比较了仿射和射影坐标系下显式公式的速度。所提出的显式公式在Pentium-M处理器上表现出优异的性能。与仿射坐标的情况相比,我们能够获得超过40%的性能提升。因此,我们新导出的公式是在实际应用中使用HECC的又一步。
{"title":"Inversion-free arithmetic on genus 3 hyperelliptic curves and its implementations","authors":"Xinxin Fan, T. Wollinger, Yumin Wang","doi":"10.1109/ITCC.2005.179","DOIUrl":"https://doi.org/10.1109/ITCC.2005.179","url":null,"abstract":"Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, explicit formulae without using inversion for genus 3 HECC are given for the first time. When genus 3 HECC is defined over a prime field, our explicit formulae will cost respectively 122M + 9S, 105M + 8S and 110M + 11S to perform a group addition, mixed addition and doubling. If we use special genus 3 hyperelliptic curves with h(x) = 1 over a binary field, our explicit formulae will need only 119M + 9S, 102M + 8S and 42M + 15S for a group addition, mixed addition and doubling, respectively. In the second part of our contribution, we implement inversion-free arithmetic on genus 3 hyperelliptic curves defined over one prime field and three binary fields on a Pentium-M processor and compare the speed of explicit formulae in affine and projective coordinate system. The proposed explicit formulae show excellent performance on Pentium-M processors. We were able to get an increase in performance of over 40% compared to the affine coordinate case. Hence, our newly derived formulae are another step towards the use of HECC in practical applications.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online gaming cheating and security issue 网络游戏作弊和安全问题
Ying-Chieh Chen, Jing-Jang Hwang, R. Song, George Yee, L. Korba
Along with the development of multimedia, animation, and network bandwidth, online gaming has become a very successful and outstanding industry recently, especially in Asia Pacific. However, due to the lack of security consideration, legal regulation, management, auditing and related legislation, more and more players have violated the law or become the victims while they are indulging in the virtual world. Virtual properties are getting more and more valuable in the real-world marketplace, and trade or exchange of virtual properties between players have become prevalent. Unfortunately, using illegal fraudulent means or programs to grab others' UserID or password are increasing as well. This paper provides a detailed overview of the online cheating threat and the associated security flaws, examines its consequences for online businesses, and outlines technical solutions and implications.
随着多媒体、动画和网络带宽的发展,网络游戏最近已经成为一个非常成功和突出的行业,特别是在亚太地区。然而,由于缺乏安全考虑、法律监管、管理、审计和相关立法,越来越多的玩家在沉迷于虚拟世界的过程中违法或成为受害者。虚拟财产在现实世界的市场中变得越来越有价值,玩家之间的虚拟财产交易或交换变得越来越普遍。不幸的是,使用非法欺诈手段或程序获取他人的UserID或密码也在增加。本文详细概述了在线作弊威胁和相关的安全漏洞,研究了其对在线业务的影响,并概述了技术解决方案和影响。
{"title":"Online gaming cheating and security issue","authors":"Ying-Chieh Chen, Jing-Jang Hwang, R. Song, George Yee, L. Korba","doi":"10.1109/ITCC.2005.215","DOIUrl":"https://doi.org/10.1109/ITCC.2005.215","url":null,"abstract":"Along with the development of multimedia, animation, and network bandwidth, online gaming has become a very successful and outstanding industry recently, especially in Asia Pacific. However, due to the lack of security consideration, legal regulation, management, auditing and related legislation, more and more players have violated the law or become the victims while they are indulging in the virtual world. Virtual properties are getting more and more valuable in the real-world marketplace, and trade or exchange of virtual properties between players have become prevalent. Unfortunately, using illegal fraudulent means or programs to grab others' UserID or password are increasing as well. This paper provides a detailed overview of the online cheating threat and the associated security flaws, examines its consequences for online businesses, and outlines technical solutions and implications.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1