Loading...
Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Table of Content
15 October 2017, Volume 3 Issue 10
Previous Issue
Next Issue
Dean, the Pioneer and Guardian of Network Security for 20 Years Dean Group's Information Security and Strategy Based on a Network Powerful Nation
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(2297KB) (
)
Related Articles
|
Metrics
Two-phase passwords
A. W. Roscoe
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(813KB) (
)
Related Articles
|
Metrics
In recent work on making PAKE protocols auditable, we identified the need for passwords that human users were extremely unlikely to make a mistake with. The context meant that users had to use different passwords for different purposes. While not solving that problem, the present paper finds a way to structure passwords to achieve the same effect while in general making password guessing attacks more detectable and less profitable. We propose a tool to help users pick compliant passwords, and then only treat compliant passwords as worth passing on to the server.
An Anti-Lost Scheme Research for Confidential Files Based on BlockChain Technology
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(2742KB) (
)
Related Articles
|
Metrics
This paper summarizes the main confidential electronic document protection technology and Blockchain technology, proposes a technical scheme combined of Blockchain and layout document, and tries to define an intelligent document model, which can resist loss of electronic document. The author presents the architecture of confidential electronic document protection technology, which uses Blockchain structure, tamper-resistant, with smart contract, agreement mechanism and characteristics of asymmetric encryption and data security storage, realize the goal --- security control of confidential electronic document under the private Blockchain, and finally the technology is prospected
A User De-anonymization Attack Method for Trajectory Data Publishing
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(2460KB) (
)
Related Articles
|
Metrics
De-anonymization attack for trajectory mean that link anonymized trajectories to users to find out user privacy. Hidden Markov Model (HMM)-based approach is known as one of the most successful de-anonymization attacks for anonymized trajectories. However, in the key step of the HMM’s hidden states de?nition, current models rely on the ?xed classi?cation of time, space or number, which can hardly suit for various users. In addition, the time complexity of HMM-based approaches is high, so a large number of anonymous trajectories match with lots of models will seriously affect the efficiency. Finally, the de-anonymization attack is more reasonable in open scenario that some of anonymized trajectories are from non-target users, but most existing approaches are based on non-open scenario. In this paper, we propose a novel de-anonymization method. Di?erent from current approaches, this method utilize a density-based HMM, which uses the density-based clustering algorithm to obtain hidden states of HMM from spatio-temporal points of trajectories, and provide much better performance. Furthermore, we also propose a frequent spatio-temporal cube (FSTC) filter which greatly reduces the number of candidate models and thus improves the e?ciency. Finally, we add a special model to distinguish the attack process between open scenario and non-open scenario. Experiment show that this method is accurately and efficiently even in both scenarios.
A Privacy Preserving Scheme for Continuous Data Publishing Based on Clustering and Segmentation Technology
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(1613KB) (
)
Related Articles
|
Metrics
The primary goal of privacy protection for data publishing is to increase data availability without revealing user privacy. Privacy preserving of continuous data publishing is especially important, since the data is always changing rather than remain the same. The privacy preserving method of static data publishing cannot used for privacy preserving of continuous data publishing directly, since it cannot resist the attack of table link and missing key value. An l-diversity based on anatomy and clustering algorithm-LDACA was proposed for privacy preserving continuous data publishing, weight calculation using the variance of data attributes, and calculates the comprehensive value of each record. Experimental results show that the proposed algorithm has higher executive efficiency and lower information loss rate with strong privacy guarantee.
Cryptography Threshold Scheme is Derived From Sun Zi’Magical Wonderful Calculate
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(672KB) (
)
Related Articles
|
Metrics
In November 1979, Adi Shamir, an Israeli cipher scientist, published his paper and proposed the famous cryptography threshold scheme. In fact, in August 1978, the famous Chinese mathematician Loo-Keng Hua ,in order to recruit graduate students, given a examination question is this problem. The purpose of this article is to explain this and to give the answer at that time. This solution comes from Sun Zi’magical wonderful calculate.
Design and Implementation of Enterprise Cryptography Service Platform for Commercial Bank
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(1485KB) (
)
Related Articles
|
Metrics
The information system of commercial banks, especially large-scale commercial banks, is an important information infrastructure of the country, and the application of cryptography is vital to information protection. The traditional information systems has its own function of cryptography service, which has problems such as repetitive construction, poor professional performance, high maintenance cost and security risks. This article based on commercial bank information security architecture practice, using SOA techniques to decouple the cryptography service from each application system, and realize the cryptography service function modular, standardization, intelligent and parametric, and to provide component cryptography services for all enterprise information systems, ensure the safety of the network and information system of commercial banks.
Research on Risk Assessment of Cloud Computing Environment
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(1136KB) (
)
Related Articles
|
Metrics
In this paper, from the perspective of risk analysis, through the domestic and foreign cloud computing related research and development trends, combined with the actual application of cloud computing related technology, summed up 25 threat categories of cloud computing environment facing, 25 asset categories of cloud environment and their assignments, 53 kinds of vulnerability of cloud computing related technologies and components, 4 categories 18 kinds of security risks of cloud computing environment,and to service continuity risk as an example, given a brief description of the relationship and assessment methods on the cloud environment assets, threats and vulnerability, for our country to carry out cloud computing environment risk assessment and related security work to provide a reference.
Research on Information Security Audit Problems and Innovation Strategy in Application
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(2314KB) (
)
Related Articles
|
Metrics
At present, there is a lack of top-level design in the field of Information Security Audit in our country. The relevant legislation is still not complete, and the Information Security Audit management rules and regulations are imperfect, leading to the implementation of Information Security Audit is not standard. Based on the clear definition of Information Security Audit, this paper analyzes the current situation of Information Security Audit in China, and puts forward the problems in the application of Information Security Audit. In order to implement the Information Security Audit reasonably and effectively, this paper puts forward the optimized system architecture, and adds the risk assessment mechanism of Information Security Audit management, which develops the risk management plans for potential security incidents.
Research on Information Crawling Technology of Anonymous Web- site
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(3844KB) (
)
Related Articles
|
Metrics
Crawling anonymous websites is an important basis for supervising those websites effectively. This paper dissects the differences and connections between the concepts of surface web, deep web, darknet and anonymous web. Meanwhile, several common anonymous web technologies, such as Tor, I2P, HORNET, are analyzed. This paper presents a method for crawling Tor websites by linking Scrapy to the Polipo server, so that Scrapy can be combined with Tor browser to enter Tor web. It provides a feasible technical means for supervising the darknet.
The Identification of Critical Information Infrastructure and the Enlightenment to China
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(703KB) (
)
Related Articles
|
Metrics
Critical information infrastructure is the strategic assets for a nation. Many countries have raised critical infrastructure to the national strategic level to protect it. The identification of critical information infrastructure is the precondition to protecting it, and is also one of the difficulties in practice. The United States and EU began to protect critical (information) infrastructure very early, and had formed some valuable practices on the identification, such as following the "key areas - key business - resources required" method, basing the critical criteria on the incidents consequences etc. China is developing the regulations on the protection of critical information infrastructures, which explicitly proposes the establishment of identification guidelines and identifies the critical information infrastructures accordingly. The practice of the identification of critical (information) infrastructure in the United States and EU has a lot of Enlightenment for china.
Some Thoughts on the Current Cryptologic Research
2017, 3(10): 0-0.
Asbtract
(
)
PDF
(693KB) (
)
Related Articles
|
Metrics
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work