This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti...This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example.展开更多
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ...The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given.展开更多
This paper focuses on investor relations (IR) as an element of companies' communication with the external environment. It shows the place and role of IR in communication with the general market, and the stock excha...This paper focuses on investor relations (IR) as an element of companies' communication with the external environment. It shows the place and role of IR in communication with the general market, and the stock exchange market in particular. The study is illustrated with an example of IR in Poland, a relatively new European Union (EU) member state and an emerging market. As can be seen, IR goes beyond the traditionally understood maintenance of communication with the capital market. It is also shown that the main role of IR ought to be the reduction of investment risk and enhancement of the companies' value, which is of particular significance in light of the current globalization of capital markets. It has been found that Polish companies, especially those listed on the Warsaw Securities Exchange (WSE), commonly rely on IR as a means of communication with the environment. And yet, as the results of the analysis show, the quality of that communication is still far from satisfactory, despite efforts undertaken by various external entities to encourage more focus on the development of IR, or understanding of the company's relevant staff of its important role.展开更多
远程医疗信息系统(telecare medical information systems, TMIS)极大程度地改善了患者的就医体验,已成为解决多样化医疗服务需求的可行方案.然而,当患者的隐私信息通过TMIS在公共网络上进行传输时容易遭受安全攻击.为保护患者的隐私,...远程医疗信息系统(telecare medical information systems, TMIS)极大程度地改善了患者的就医体验,已成为解决多样化医疗服务需求的可行方案.然而,当患者的隐私信息通过TMIS在公共网络上进行传输时容易遭受安全攻击.为保护患者的隐私,研究人员针对TMIS设计了大量的认证密钥交换协议,但已有协议大多存在无法抵抗离线字典攻击、用户冒充攻击、智能卡丢失攻击等安全隐患.针对上述问题,设计了一个基于椭圆曲线的认证密钥交换协议(TMIS-AKE),利用身份加密和随机化传输消息的方法实现用户的匿名性和不可追踪性.最后,通过安全性证明及性能分析,验证了TMIS-AKE协议在安全性和效率方面的优越性.展开更多
文摘This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example.
基金Supported by the National High Technology Research and Development Program of China("863"Program)(2006AA706103)~~
文摘The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given.
文摘This paper focuses on investor relations (IR) as an element of companies' communication with the external environment. It shows the place and role of IR in communication with the general market, and the stock exchange market in particular. The study is illustrated with an example of IR in Poland, a relatively new European Union (EU) member state and an emerging market. As can be seen, IR goes beyond the traditionally understood maintenance of communication with the capital market. It is also shown that the main role of IR ought to be the reduction of investment risk and enhancement of the companies' value, which is of particular significance in light of the current globalization of capital markets. It has been found that Polish companies, especially those listed on the Warsaw Securities Exchange (WSE), commonly rely on IR as a means of communication with the environment. And yet, as the results of the analysis show, the quality of that communication is still far from satisfactory, despite efforts undertaken by various external entities to encourage more focus on the development of IR, or understanding of the company's relevant staff of its important role.
文摘远程医疗信息系统(telecare medical information systems, TMIS)极大程度地改善了患者的就医体验,已成为解决多样化医疗服务需求的可行方案.然而,当患者的隐私信息通过TMIS在公共网络上进行传输时容易遭受安全攻击.为保护患者的隐私,研究人员针对TMIS设计了大量的认证密钥交换协议,但已有协议大多存在无法抵抗离线字典攻击、用户冒充攻击、智能卡丢失攻击等安全隐患.针对上述问题,设计了一个基于椭圆曲线的认证密钥交换协议(TMIS-AKE),利用身份加密和随机化传输消息的方法实现用户的匿名性和不可追踪性.最后,通过安全性证明及性能分析,验证了TMIS-AKE协议在安全性和效率方面的优越性.