Select All | Select None
You can now keep track of new articles from Wuhan University Journal of Natural Sciences on your personalized homepage!
In this paper, we propose wavelet-based denoising attack methods on image watermarking in discrete cosine transform (DCT) or discrete Fourier transform (DFT) domain or discrete wavelet transform (DWT) domain. Wiener filtering based on wavelet transform is performed in approximation subband to...
In order to cope with varying protection granularity levels of XML (eXtensible Markup Language) documents, we propose a TXAC (Two-level XML Access Control) framework, in which an extended TRBAC (Temporal Role-Based Access Control) approach is proposed to deal with the dynamic XML data. With...
This paper presents an efficient recovery scheme suitable for real-time main memory database. In the recovery scheme, log records are stored in non-volatile RAM which is divided into four different partitions based on transaction types. Similarly, a main memory database is divided into four...
This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure....
The difficulty of extracting hidden information, which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the...
A new method using support vector data description (SVDD) to distinguish legitimate users from masqueraders based on UNIX user command sequences is proposed. Sliding windows are used to get low detection delay. Experiments demonstrate that the detection effect using enriched sequences is better...
An efficient authenticated key agreement protocol is proposed, which makes use of bilinear pairings and selfcertified public keys. Its security is based on the security assumptions of the bilinear Diffie-Hellman problem and the computational Diffie-Hellman problem. Users can choose their private...
In order to solve security problem of clustering algorithm, we proposed a method to enhance the security of the well-known lowest-ID clustering algorithm. This method is based on the idea of the secret sharing and the ( k, n ) threshold cryptography. Each node, whether clusterhead or ordinary...
We mainly explore two problems when combining IPSec module into TCP/IP stack by porting the famous IPSec software (FreeS/WAN) into a security gateway. One is how to implement the IPSec module based on Netfilter in Linux 2. 4. x kernel. The other problem is the performance evaluation. We test the...
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.