13-15 Oct. 2014
Filter Results
-
[Front cover]
Publication Year: 2014, Page(s): C4|
PDF (1965 KB)
-
[Title page i]
Publication Year: 2014, Page(s): i|
PDF (101 KB)
-
[Title page iii]
Publication Year: 2014, Page(s): iii|
PDF (125 KB)
-
[Copyright notice]
Publication Year: 2014, Page(s): iv|
PDF (119 KB)
-
Table of contents
Publication Year: 2014, Page(s):v - xi|
PDF (165 KB)
-
-
Message from the Steering Committee Chair
Publication Year: 2014, Page(s): xiii -
Message from the Technical Program Chairs
Publication Year: 2014, Page(s): xiv -
Committees
Publication Year: 2014, Page(s):xv - xvi|
PDF (108 KB)
-
Reviewers
Publication Year: 2014, Page(s):xvii - xix|
PDF (105 KB)
-
Keynotes
Publication Year: 2014, Page(s):xx - xxivProvides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»
-
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Publication Year: 2014, Page(s):1 - 6To resolve the more and more serious problems of sensitive data leakage from Android systems, a kind of method of data protection on encryption storage and encryption transmission is presented in this paper by adopting secure computation environment of SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is designed. It is used for login on system boot and lock screen.... View full abstract»
-
Random Characteristics for LSR, RC4, and Logistic Stream Cipher
Publication Year: 2014, Page(s):7 - 9LSR, RC4 and Logistic chaos ciphers are the representatives of the mostly used cipher. In this paper, we study the random characteristics and the generation of their sequences. In the setting of approximation condition, we performed 15 tests for their random performance by NIST software sts -- 2.1.1. Using these testing results, we analyze their random properties and indicate the application benef... View full abstract»
-
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
Publication Year: 2014, Page(s):10 - 13In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel ... View full abstract»
-
An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO Network
Publication Year: 2014, Page(s):14 - 18The Network Mobility (NEMO) Basic Support protocol enables support for network mobility for MIPv6 networks, and multihoming technology provides support for multiple mobile routers (MRs) in one mobile network. Due to the critical role in acting as a gateway, the MR is particular vulnerable to various internal and external attacks, even being penetrated and controlled. The mobile nodes (MNs) attachi... View full abstract»
-
A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data
Publication Year: 2014, Page(s):19 - 26
Cited by: Papers (7)One of the biggest impediments that prevent the evolution of big data is the privacy of users. Many advanced researches are done within this topic and a lot of concepts had seen the light. One is a cryptographic concept known as homomorphic encryption which allows the application of operations on ciphered data without need to decipher it. However, from the cryptographic aspect, the homomorphic enc... View full abstract»
-
A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
Publication Year: 2014, Page(s):27 - 30In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel ... View full abstract»
-
Automated Intrusion Response System Algorithm with Danger Theory
Publication Year: 2014, Page(s):31 - 34Intrusion response is a new generation of technology basing on active defence idea, which has very prominent significance on the protection of network security. However, the existing automatic intrusion response systems are difficult to judge the real "danger" of invasion or attack. In this study, an immune-inspired adaptive automated intrusion response system model, named as AIAIM, was given. Wit... View full abstract»
-
Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based Approach
Publication Year: 2014, Page(s):35 - 42
Cited by: Papers (1)This paper presents a systematic design methodology for neural-network (NN) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H∞ performance and cryptography. First, we use the n-shift cipher and key to the original message of transmission for encryption. The encrypted message is re-encrypted by using chaotic synchronization. A robust model-ba... View full abstract»
-
A Heuristic Method of Attack Graph Analysis for Network Security Hardening
Publication Year: 2014, Page(s):43 - 47Traditional vulnerability scan tools cannot show the associations among vulnerabilities, and thus the security administrators have the difficulty to comprehensively understand the risks in networks according to the vulnerabilities sources. With the number of vulnerabilities growing rapidly, repairing all vulnerabilities costs much. In order to mitigate this problem, we propose a method using attac... View full abstract»
-
Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data Mode
Publication Year: 2014, Page(s):48 - 55It is generally agreed that multiple hardware resources increase computing speed as each core provides individual data output. The provision of individual data output enables multiple cores to process and output data from each core independently. The individual characteristics of multiple hardware resources enhances data ciphering speed and outputs individual streams of cipher text. After encipher... View full abstract»
-
Positive Selection-Inspired Anomaly Detection Model with Artificial Immune
Publication Year: 2014, Page(s):56 - 59Network anomaly detection has become the promising aspect of intrusion detection. The existing anomaly detection models depict the detection profiles with a static way, which lack good adaptability and interoperability. Furthermore, the detection rate is low, so they are difficult to implement the real-time detection under the high-speed network environment. In this paper, the excellent mechanisms... View full abstract»
-
DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions
Publication Year: 2014, Page(s):60 - 65Money laundering refers to disguise or conceal the source and nature of variety ill-gotten gains, to make it legalization. In this paper, we design and implement the anti-money laundering regulatory application system (AMLRAS), which can not only automate sorting and counting the money laundering cases in comprehension and details, but also collect, analyses and count the large cash transactions. ... View full abstract»
-
Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative
Publication Year: 2014, Page(s):66 - 72Security questions are often based on personal information that is limited in variety, available in the public record and very difficult to change if compromised. A personalized folktale shared only by the communicating parties provides memorizable basis for individualized security questions that can be readily replaced in the event of a security breach. We utilize the Propp theory of narrative to... View full abstract»
-
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code
Publication Year: 2014, Page(s):73 - 78
Cited by: Papers (3)The security of radio frequency identification (RFID) has become an increasingly severe issue. We propose a mutual RFID authentication secure protocol, based on the QC-MDPC McEliece type public cryptography in order to protect the information interaction security in wireless channel of RFID system. It owns low storage of public key, perfect efficiency of encryption and decryption, and high securit... View full abstract»