期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
ADS-B Data Authentication Based on ECC and X.509 Certificate 被引量:6
1
作者 Wei-Jun Pan,Zi-Liang Feng,and Yang Wang the College of ComputerScience,Sichuan University,Chengdu 610065,Chinah the College of Aviation Management,the Civil Aviation Flight University of China,Guanghan 618307,China. 《Journal of Electronic Science and Technology》 CAS 2012年第1期51-55,共5页
An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system d... An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode. 展开更多
关键词 Automatic dependent surveillance-broadcast data authentication elliptic curve cipher X.509.
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
2
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:3
3
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
Blockchain Based Redistricting with Public Participation
4
作者 Mahalingam Ramkumar Naresh Adhikari 《Journal of Information Security》 2022年第3期140-164,共25页
Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness... Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper proposes a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the expected metric. Only the plan with the best claimed metric needs to be evaluated in a blockchain network. 展开更多
关键词 REDISTRICTING Authenticated data Structures Blockchain Ledger
下载PDF
Authoritative and Unbiased Responses to Geographic Queries
5
作者 Mahalingam Ramkumar Naresh Adhikari 《Journal of Information Security》 2022年第3期101-126,共26页
A protocol for processing geographic data is proposed to guarantee authoritative and unbiased responses to geographic queries, without the need to rely on trusted third parties. The integrity of the proposed authorita... A protocol for processing geographic data is proposed to guarantee authoritative and unbiased responses to geographic queries, without the need to rely on trusted third parties. The integrity of the proposed authoritative and unbiased geographic services (AUGS) protocol is guaranteed by employing novel hash tree based authenticated data structures (ADS) in conjunction with a blockchain ledger. Hash tree based ADSes are used to incrementally compute a succinct dynamic commitments to AUGS data. A blockchain ledger is used to record 1) transactions that trigger updates to AUGS data, and 2) the updated cryptographic commitments to AUGS data. Untrusted service providers are required to provide verification objects (VOs) as proof-of-correctness of their responses to AUGS queries. Anyone with access to commitments in ledger entries can verify the proof. 展开更多
关键词 Authenticated data Structures Blockchain Ledger Geographic Information Systems
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部