期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SeSoa: Security Enhancement System with Online Authentication for Android APK 被引量:1
1
作者 DONG Zhenjiang WANG Wei +3 位作者 LI Hui ZHANG Yateng ZHANG Hongrui ZHAO Hanyu 《ZTE Communications》 2016年第B06期44-50,共7页
Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect the security of operational system. However, these methods are unable to protect the applications of Androi... Android OS provides such security mechanisms as application signature, privilege limit and sandbox to protect the security of operational system. However, these methods are unable to protect the applications of Android against anti-reverse engineering and the codes of such applications face the risk of being obtained or modified, which are always the first step for further attacks. In this paper, a security enhancement system with online authentication (SeSoa) for Android APK is proposed, in which the code of Android application package (APK) can be automatically encrypted. The encrypted code is loaded and run in the Android system after being successfully decrypted. Compared with the exiting software protecting systems, SeSoa uses online authentication mechanism to ensure the improvementof the APK security and good balance between security and usability. 展开更多
关键词 software protection anti-reverse ANDROID AUTHENTICATION
下载PDF
Efficient Broadcast Encryption Scheme Based on Number Theory Research Unit
2
作者 ZHANG Weidong LU Xixiang LI Hui 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期247-250,共4页
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA a... In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA and develop this idea from two-party to multi-party, and combine this multi-party public key idea with the multiplication in ring R of NTRU. What we get from this design is extremely efficient encryption and decryption, fast and easy key creation, low memory requirements and revocation property, etc. Moreover, this novel work contains other desirable features, such as traitor tracing. With its complexity only O(log2n), the tracing algorithm of this system is more efficient than that of the previous ones. 展开更多
关键词 broadcast encryption traitor tracing software protection information security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部