Please wait a minute...

����Ŀ¼

    15 June 2017, Volume 3 Issue 6
    Papers
    Secure efficient and verifiable large linear equations solve outsourcing computing scheme
    Xing-lan ZHANG,Xiang LIU
    2017, 3(6):  1-7.  doi:10.11959/j.issn.2096-109x.2017.00161
    Asbtract ( 1270 )   HTML ( 5)   PDF (702KB) ( 2338 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.

    Trajectories anonymous algorithm for association attack
    Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI
    2017, 3(6):  8-20.  doi:10.11959/j.issn.2096-109x.2017.00130
    Asbtract ( 953 )   HTML ( 8)   PDF (804KB) ( 1877 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    During the location based service of continuous query,the trajectories which were produced by different movement types may reveal the privacy of user’s location.To solve this problem,a mechanism was proposed to put forward the real-time similar trajectories.With this mechanism,the subsequent position was calculated and which the dummy one was generated to establish an anonymous group,the demands of real-time trajectory anonymity were met,compensating the shortage of real-time trajectories of anonymity in other similar kinds of algorithm.Under this mechanism,a method for calculating subsequent anonymous position was proposed,which used the user's movement patterns,such as mobile direction,speed.The dummy trajectories were made very similar with the trajectory produced by the continuous query user.At the same time,the position of reachable difference in real areas was put forward,and on the basis of position reachable,this mechanism also filtrates out the unreachable candidate locations which had been calculated in the phase of dummy position generates,then decrease the probability of adversary identifies the real trajectory from the location of unreachable.Experimental results show that this method is effective for protecting the location privacy of continuous query user,and provides a good working efficiency.

    Static-analysis-based event input generation approach for Android application
    Yi-lin YE,Zhen-ji ZHOU,Zheng HONG,Hui-ying YAN,Li-fa WU
    2017, 3(6):  21-32.  doi:10.11959/j.issn.2096-109x.2017.00169
    Asbtract ( 1299 )   HTML ( 1)   PDF (449KB) ( 2290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.

    Temporal relation recognition method based on news event fragments
    Ying-jun LI,Hong-li ZHANG,Xing WANG
    2017, 3(6):  33-41.  doi:10.11959/j.issn.2096-109x.2017.00171
    Asbtract ( 1237 )   HTML ( 9)   PDF (536KB) ( 3974 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Event fragments as the smallestr unit was defined and a two-stage event fragments temporal relation recognition algorithm was proposed.The first stage is sequential mapping and the second is sequence recognition.The real online data increased accuracy by 4% compared to common classifier and strong rule algorithm.

    Video tamper detection method based on nonnegative tensor factorization
    Xue-li ZHANG,Tian-qiang HUANG,Jing LIN,Wei HUANG
    2017, 3(6):  42-49.  doi:10.11959/j.issn.2096-109x.2017.00174
    Asbtract ( 1239 )   HTML ( 3)   PDF (594KB) ( 1834 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.

    Construction of network ecological civilization based on the anti-terrorism of colleges and universities
    You-deng CHEN
    2017, 3(6):  50-57.  doi:10.11959/j.issn.2096-109x.2017.00172
    Asbtract ( 1248 )   HTML ( 1)   PDF (491KB) ( 1679 )   Knowledge map   
    References | Related Articles | Metrics

    Firstly,the basic connotation,significance and potential crisis of the network ecological civilization were introduced.Secondly,the basic situation of the current network terrorism and the challenge to the human civilization and security were analyzed,and the information dissemination was the foundation and that the key point of building the network ecological civilization was put forward.Finally,from the construction of the network discourse system,the construction of the network culture system,the construction of the network ethics system,the planning suggestions were put forward to explore and perfect the construction of the anti-terrorism path of the university network in our country.

    Research on Java card security
    Xue-lian ZHANG,Zhen WU,Zhi-bo DU,Min WANG,Chun-ling XIANG
    2017, 3(6):  58-64.  doi:10.11959/j.issn.2096-109x.2017.00173
    Asbtract ( 1226 )   HTML ( 2)   PDF (390KB) ( 2803 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault injection and combined attack.At the same time,some problems with the attack process were presented.Moreover,some corresponding countermeasures were put forward and their shortages were analyzed.Finally,the future research direction was prospected.

    Construction of diffusion layers based on cipher structures
    Peng-fei LI
    2017, 3(6):  65-76.  doi:10.11959/j.issn.2096-109x.2017.00170
    Asbtract ( 1415 )   HTML ( 9)   PDF (1136KB) ( 2237 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the construction of software-oriented diffusion layers based on Feistel structure and the construction of hardware-oriented diffusion layers based on LFSR.Lightweight involution diffusion layers with branch numbers 7 over eight 4-bit and 8-bit S-boxes were constructed by 3-round Feistel structure and the round functions adopt linear transformations with rotation and XORs.Some suboptimal diffusion layers over four 4 bit and 8 bit S-boxes and diffusion layers with branch numbers 7 over eight 4 bit and 8 bit S boxes based on LFSR were constructed.In addition,6,7,8 dimension MDBL matrices and many 16,18,32 dimension binary matrices with big dimension and branch numbers 7,7,12 based on LFSR were constructed.The experimental results have high practical significance in realm of the design of block cipher algorithms.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: