Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification t...Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification to ensuresustainable development of ecotourism. But there are few products certificated until now in China. After reviewing thetrend of ecotourism certification in the world and summarizing its theory and method, this paper analyzes the progressand prospect of ecotourism certification in China, and concludes that certification in China is necessary and promising.展开更多
The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has...The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that...A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.展开更多
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
文摘Since the middle 1990s, ecotourism certification has been given more and more attention to around the world.As a developing country with abundant ecotourism products, it is necessary for China to adopt certification to ensuresustainable development of ecotourism. But there are few products certificated until now in China. After reviewing thetrend of ecotourism certification in the world and summarizing its theory and method, this paper analyzes the progressand prospect of ecotourism certification in China, and concludes that certification in China is necessary and promising.
文摘The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
基金Project(2012BAH09B02) supported by the National Science and Technology Support Program,ChinaProjects(12JJ3068,12JJ2041) supported by the Natural Science Fundation of Hunan Province,China
文摘A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.