2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
A Novel Method of Protection of Monitor Link
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.337-346
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Automation control systems demand high availability by providing its’ users with reliable and uninterrupted service. Traditional monitor system fails to provide reliable service due to lack of protection of monitor link. It also requires TCP/IP, X.25, E1 and other interfaces to realize monitoring channels such as setting monitored object, reporting status information of monitored call, reporting voice data of monitored call. The organization of the system is very complicated. Besides, some old devices can’t provide all the interfaces. Thus these old devices can’t have access to the lawful interception system. This paper presents a method to provide the ability of monitor link protection under abnormal circumstance. This method offers complete monitor link protection with fewer interfaces. According to the result of experiment and practical application in many countries, the availability and reliability of the interception system have been greatly improved by using this method.
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.347-356
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Pro-active head restraint is a new automotive safety device with both active safety and passive safety characteristics. It can make a pre-estimation of the occurrence possibility of rear-end collision. Thus, the whiplash injury can be effectively reduced or even prevented. One of the key elements in rear-end collision avoidance system is to establish an effective safety distance mathematical model. Based on the running state of front car, the related calculation models of safety distance are established by means of dynamical and kinematical analysis of vehicle braking process and following process. Taken randomness and dynamic characteristics of parameters into consideration, the fuzzy relations between these parameters should be validated by means of fuzzy theory. Thus, it may accord with the actual driving conditions. By using the MATLAB software, the study shows that safety distance model and the methods used to determine parameters are reasonable, and the false alarm can be effectively minimized.
Network Threat Analysis based on Vulnerability Relation Model
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.357-368
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A vulnerability relative model based on object time Petri net is proposed for threat evaluation. Combined with Object Oriented technology, the definition of network node object and node class is given, which can help attack information modulation design. By defining the threat of an attack and each index’s quantization method, introduce complexity and harmfulness of network attack into the model, and then utilize and improve Dijkstra algorithm to propose non-target oriented and target oriented network threat analysis method.
Efficient Methods to Trigger Adversarial Behaviors from Malware during Virtual Execution in SandBox
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.369-376
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, various organizations are confronting a grater attack surface, the growing proliferation of malware and the number of malicious codes has been consistently growing for several years. To respond actively against these malicious codes, analysts employ automated investigation tools on the malware. However, there has been advent of malware employing the various techniques to avoid the detection of the SandBox, which makes hard to identify the adversarial behaviors of the samples codes. In this paper, we propose efficient methods to trigger adversarial behaviors from the sample codes during virtual execution in the Sandbox in order to perform the analysis of malware.
Arbitrated Proxy Signature Scheme Based on Quantum Cryptography
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.377-386
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Proxy signature is a special signature which provided the signer can delegate his signing capability to others. The proxy signature provides that the original signer can delegate his signing permission to a proxy signer, and the proxy signer can replace the original signer to sign the message. In this paper, we propose a proxy signature scheme based on ideas from classical proxy signature schemes and quantum cryptography. The scheme is implemented by Bell states and a symmetrical quantum key cryptosystem. Compile with classical proxy signature schemes, the new scheme can guarantee the security by using quantum key distribution and one-time pads. And it also can prove that the scheme have the characteristics of non-counterfeit, non-disavowal and traceability. Furthermore, the new scheme uses a special quantum encryption to ensure the receiver cannot forge the signature. The validity of the new scheme can be verified, and it is a secure proxy signature scheme.
Security on Dynamic ID-based Authentication Schemes
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.387-396
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Dynamic ID-based authentication schemes based on password and smart card are widely used to provide two-factor authentication and user anonymity. However, these schemes have one or the other possible security weaknesses. In this paper, we analyze the schemes of Li et al. and Wang et al. published in recent years. After the analysis, we demonstrates that Li et al.’s schemes are vulnerable to off-line password guessing attack if the user’s identity is compromised, Li et al.’s scheme cannot withstand the impersonation attack and linkability attack, Wang et al.’s schemes cannot resist off-line password guessing attack if the attacker steals a smart card, Wang et al.’s schemes fail to provide forward security. Our result shows that none of the existing dynamic ID based authentication schemes can achieve all the desirable security goals.
An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.397-408
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To protect the resources from unauthorized users, the remote user authentication have become an essential part in the communication network. Currently, smart card-based remote user authentication for multi-server environment is a widely used and researched method. Remote user authentication for multi-server environment has resolved the problem of users to manage the different identities and passwords. Recently, Mishra et al. proposed a multi-server authenticated key agreement scheme using smart cards, where they claim that their scheme is secure enough and could resist the various well known attacks. However, in this paper, we have shown that their scheme is not secure as they have claimed and can suffer from impersonation attacks and stolen smart card attack. Later in the paper, we propose an improved multi-server authentication scheme using smart cards, which not only overcomes the mentioned weaknesses but also can provide more functionality features.
Joint Fingerprinting/Encryption for Medical Image Security
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.1 2015.01 pp.409-418
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff member, the scheme proposed in this paper provides a joint fingerprinting and encryption (JFE) scheme based on GoL (Game of Life) and DNA computing with the purpose of protecting medical media distribution. In this study, GoL and DNA are used to confuse in DWT domain and diffusion in spatial domain respectively, and fingerprints are embedded into the HL and LH subbands of DWT domain. The use of fingerprinting along with encryption can provide a double-layer of protection to medical image. Experimental results show the effectiveness of the proposed scheme.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.