Select All | Select None
You can now keep track of new articles from Wuhan University Journal of Natural Sciences on your personalized homepage!
Current trusted computing platform only verifies application’s static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building method for trusted computing dynamic verification, including control flow graph...
This paper design the P -permutation with cryptologic properties beyond certain bound based on BCH code and Goppa code, which is the generalization of the design method utilizing the maximum distance separable (MDS) code, and presents the novel algorithms to generate the P -permutations with the...
Quorum system is a preferable model to construct distributed access control architecture, but not all quorum system can satisfy the requirements of distributed access control architecture. Aiming at the dependable problem of authorization server in distributed system and combining the...
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller...
To tackle trust asymmetry problem in grid authentication (GAu), this paper proposes a novel GAu mechanism to help establish a symmetric trust relationship between resource consumer and resource provider on the grid. To exemplify the designing of the novel GAu mechanism, a prototype is also given...
This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains. vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolated circumstance from the virtual domain, and can be attested by a remote party...
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA and develop this idea from two-party to multi-party, and combine this multi-party...
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties’ ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we...
The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the RC4 algorithm which broadens the application area of the RC4 and decreases the...
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user’s trustworthiness based on his historical behaviors; second,...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.