期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
ADS-B Data Authentication Based on ECC and X.509 Certificate 被引量:5
1
作者 Wei-Jun Pan,Zi-Liang Feng,and Yang Wang the College of ComputerScience,Sichuan University,Chengdu 610065,Chinah the College of Aviation Management,the Civil Aviation Flight University of China,Guanghan 618307,China. 《Journal of Electronic Science and Technology》 CAS 2012年第1期51-55,共5页
An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system d... An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode. 展开更多
关键词 Automatic dependent surveillance-broadcast data authentication elliptic curve cipher X.509.
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
2
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
Data Hiding in DNA for Authentication of Plant Variety Rights
3
作者 Wei-Liang Tai Charles C.N.Wang +1 位作者 Phillip C.Y.Sheu Jeffrey J.P.Tsai 《Journal of Electronic Science and Technology》 CAS 2013年第1期38-43,共6页
Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive r... Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety. Digital watermarking techniques have been proposed for a wide range of applications, including ownership protection, copy control, annotation, and authentication. However, existing data hiding methods for DNA change the functionalities of DNA sequences, which induce morphological changes in biological patterns. This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences. This scheme adaptively varies the embedding process according to the amount of hidden data. Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes. And the robustness and security issues are also analyzed. 展开更多
关键词 authentication data hiding deoxyribose nucleic acid watermarking.
下载PDF
云端多管理者群组共享数据中具有隐私保护的公开审计方案 被引量:13
4
作者 付安民 秦宁元 +1 位作者 宋建业 苏铓 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2353-2362,共10页
随着云存储服务的广泛使用,用户数据不仅能存储在云中,并且能够由多个用户共享.为了保证云端群组共享数据的完整性,研究者提出了多项针对云端群组共享数据公开审计方案.但是,现有方案只考虑了群组用户中仅有单个群管理者的情形,并且没... 随着云存储服务的广泛使用,用户数据不仅能存储在云中,并且能够由多个用户共享.为了保证云端群组共享数据的完整性,研究者提出了多项针对云端群组共享数据公开审计方案.但是,现有方案只考虑了群组用户中仅有单个群管理者的情形,并且没有考虑群组用户身份追踪过程中的陷害性问题.提出的方案中首次给出了面向多管理者群组共享数据的公开审计安全模型,并通过构造基于可撤销的群签名和(t,s)门限方案的多群管理者同态可验证群签名,设计了首个适用于多管理者群组共享数据的公开审计方案.提出的公开审计方案不仅能够实现身份隐私、可追踪性和不可陷害性等多层次的隐私保护能力,并且能很好地支持群组用户的撤销和续约.此外,方案的审计开销与群组用户数量大小无关,保证了方案的可行性和高效性. 展开更多
关键词 数据完整性 公开审计 隐私保护 不可陷害性 同态认证
下载PDF
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:3
5
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
Blockchain Based Redistricting with Public Participation
6
作者 Mahalingam Ramkumar Naresh Adhikari 《Journal of Information Security》 2022年第3期140-164,共25页
Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness... Redistricting is the process of grouping all census blocks within a region to form larger subdivisions, or districts. The process is typically subject to some hard rules and some (soft) preferences to improve fairness of the solution. Achieving public consensus on the fairness of proposed redistricting plans is highly desirable. Unfortunately, fair redistricting is an NP hard optimization problem. The complexity of the process makes it even more challenging to convince the public of the fairness of the proposed solution. This paper proposes a completely transparent blockchain based strategy to promote public participation in the redistricting process, to increase public confidence in the outcome of the process. The proposed approach is based on the fact that one does not have to worry about how the NP hard problem was solved, as long as it is possible for anyone to compute a “goodness” metric for the proposed plan. In the proposed approach, anyone can submit a plan along with the expected metric. Only the plan with the best claimed metric needs to be evaluated in a blockchain network. 展开更多
关键词 REDISTRICTING authenticated data Structures Blockchain Ledger
下载PDF
Authoritative and Unbiased Responses to Geographic Queries
7
作者 Mahalingam Ramkumar Naresh Adhikari 《Journal of Information Security》 2022年第3期101-126,共26页
A protocol for processing geographic data is proposed to guarantee authoritative and unbiased responses to geographic queries, without the need to rely on trusted third parties. The integrity of the proposed authorita... A protocol for processing geographic data is proposed to guarantee authoritative and unbiased responses to geographic queries, without the need to rely on trusted third parties. The integrity of the proposed authoritative and unbiased geographic services (AUGS) protocol is guaranteed by employing novel hash tree based authenticated data structures (ADS) in conjunction with a blockchain ledger. Hash tree based ADSes are used to incrementally compute a succinct dynamic commitments to AUGS data. A blockchain ledger is used to record 1) transactions that trigger updates to AUGS data, and 2) the updated cryptographic commitments to AUGS data. Untrusted service providers are required to provide verification objects (VOs) as proof-of-correctness of their responses to AUGS queries. Anyone with access to commitments in ledger entries can verify the proof. 展开更多
关键词 authenticated data Structures Blockchain Ledger Geographic Information Systems
下载PDF
Methods for Controlling the Authenticity of Textual Information Transfer on the Basis of Statistical and Structural Redundancy 被引量:1
8
作者 Akmal R.Akhatov 《International Journal of Automation and computing》 EI 2012年第5期518-529,共12页
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ... In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization. 展开更多
关键词 authenticity data transfer text element structural and statistical redundancy probability of non-detected mistakes
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部