To see the other types of publications on this topic, follow the link: SIGNATURE FILES.

Journal articles on the topic 'SIGNATURE FILES'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SIGNATURE FILES.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Faloutsos, Chris. "Signature files." ACM SIGMOD Record 14, no. 4 (May 1985): 63–82. http://dx.doi.org/10.1145/971699.318903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yangjun. "Signature files and signature trees." Information Processing Letters 82, no. 4 (May 2002): 213–21. http://dx.doi.org/10.1016/s0020-0190(01)00266-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Tong, Wenbin Chen, Yi Tang, and Hongyang Yan. "A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT." Security and Communication Networks 2018 (June 14, 2018): 1–6. http://dx.doi.org/10.1155/2018/9641273.

Full text
Abstract:
As a method for increasing throughput and improving reliability of routing, network coding has been widely used in decentralized IoT systems. When files are shared in the system, network coding signature techniques can help authenticate whether a modified packet in files is injected or not. However, in an IoT system, there are often multiple source devices each of which has its own authentication key, where existing single-source network coding signature schemes cannot work. In this paper, we study the problem of designing secure network coding signatures in the network with multiple sources and propose the multisource homomorphic network coding signature. We also give construction and prove its security.
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Z., and C. Faloutsos. "Frame-sliced signature files." IEEE Transactions on Knowledge and Data Engineering 4, no. 3 (June 1992): 281–89. http://dx.doi.org/10.1109/69.142018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Zheng. "Concurrent frame signature files." Distributed and Parallel Databases 1, no. 3 (July 1993): 231–49. http://dx.doi.org/10.1007/bf01263332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moshood Abiola, Alogba, and Mohd Fadzli Marhusin. "Signature-Based Malware Detection Using Sequences of N-grams." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 120. http://dx.doi.org/10.14419/ijet.v7i4.15.21432.

Full text
Abstract:
The focus of our study is on one set of malware family known as Brontok worms. These worms have long been a huge burden to most Windows-based user platforms. A prototype of the antivirus was able to scan files and accurately detect any traces of the Brontok malware signatures in the scanned files. In this study, we developed a detection model by extracting the signatures of the Brontok worms and used an n-gram technique to break down the signatures. This process makes the task to remove redundancies between the signatures of the different types of Brontok malware easier. Hence, it was used in this study to accurately differentiate between the signatures of both malicious and normal files. During the experiment, we have successfully detected the presence of Brontok worms while correctly identifying the benign ones. The techniques employed in the experiment provided some insight on creating a good signature-based detector, which could be used to create a more credible solution that eliminates any threats of old malware that may resurface in the future.
APA, Harvard, Vancouver, ISO, and other styles
7

Zobel, Justin, Alistair Moffat, and Kotagiri Ramamohanarao. "Inverted files versus signature files for text indexing." ACM Transactions on Database Systems 23, no. 4 (December 1998): 453–90. http://dx.doi.org/10.1145/296854.277632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zezula, P., F. Rabitti, and P. Tiberio. "Dynamic partitioning of signature files." ACM Transactions on Information Systems 9, no. 4 (October 1991): 336–67. http://dx.doi.org/10.1145/119311.119313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grandi, Fabio. "On the signature weight in “multiple” m signature files." ACM SIGIR Forum 29, no. 1 (March 21, 1995): 20–25. http://dx.doi.org/10.1145/207556.207560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bastian, Alvian. "Improving Antivirus Signature For Detection Ransomware Attacks With Machine Learning." Smart Comp :Jurnalnya Orang Pintar Komputer 10, no. 1 (January 20, 2021): 30–34. http://dx.doi.org/10.30591/smartcomp.v10i1.2190.

Full text
Abstract:
Cybercrime activities are difficult separate from the development of malware. In Internet Security Threat Report, crime by exploiting malware becomes the ultimate crime. One of the highest spreading malwares is ransomware. Ransomware infections has increased year by year since 2013 and there are 1,271 detections for one day in 2017. Meanwhile, in 2018 there was a shift in attacks where 81 percent of attacks targeted enterprise so that ransomware infections increased by 12 percent. For solve this problem, this research proposed antivirus signature based on DLL Files and API Calls of ransomware files. Detection files based on antivirus signature has high theoretical value and practical significance. The experiment showed detection ransomware files based on DLL Files and functional API Calls with machine learning have a good result than detection files based on MD5 and hexdump. For testing and detection ransomware files, this research is using machine learning algorithms such as KNN, SVM, Decision Trees, and Random Forest. Experiment result showed the successful detection ransomware files, improved detection object and method research for antivirus signature.
APA, Harvard, Vancouver, ISO, and other styles
11

Rizal, Randi, Ruuhwan Ruuhwan, and Septian Chandra. "Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.

Full text
Abstract:
The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.
APA, Harvard, Vancouver, ISO, and other styles
12

Tiberio, Paolo, and Pavel Zezula. "Selecting signature files for specific applications." Information Processing & Management 29, no. 4 (July 1993): 487–98. http://dx.doi.org/10.1016/0306-4573(93)90044-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Carterette, Ben, and Fazli Can. "Comparing inverted files and signature files for searching a large lexicon." Information Processing & Management 41, no. 3 (May 2005): 613–33. http://dx.doi.org/10.1016/j.ipm.2003.12.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Farjamfar, Aanahita, Mohd Taufik Abdullah, Ramlan Mahmod, and Nur Izura Udzir. "Multimedia Files Signature Analysis in Blackberry Z10." Journal of Applied Sciences 15, no. 4 (March 15, 2015): 668–74. http://dx.doi.org/10.3923/jas.2015.668.674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Dik Kun, and Liming Ren. "Document ranking on weight-partitioned signature files." ACM Transactions on Information Systems 14, no. 2 (April 1996): 109–37. http://dx.doi.org/10.1145/226163.226164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ciaccia, Paolo, Paolo Tiberio, and Pavel Zezula. "Declustering of key-based partitioned signature files." ACM Transactions on Database Systems 21, no. 3 (September 1996): 295–338. http://dx.doi.org/10.1145/232753.232755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vinod, P., Vijay Laxmi, Manoj Singh Gaur, and Grijesh Chauhan. "Detecting malicious files using non-signature-based methods." International Journal of Information and Computer Security 6, no. 3 (2014): 199. http://dx.doi.org/10.1504/ijics.2014.066646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ying, Zhongwen, and Thomas G. Robertazzi. "Signature Searching in a Networked Collection of Files." IEEE Transactions on Parallel and Distributed Systems 25, no. 5 (May 2014): 1339–48. http://dx.doi.org/10.1109/tpds.2013.258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Shan, Man-Kwan, and Suh-Yin Lee. "Dynamic allocation of Signature Files on Parallel devices." Information Systems 23, no. 7 (November 1998): 489–508. http://dx.doi.org/10.1016/s0306-4379(98)00024-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Im, Byoung-Mo, Myoung Ho Kim, Hyung-Il Kang, and Jae Soo Yoo. "Declustering signature files based on a dynamic measure." Information Processing Letters 74, no. 5-6 (June 2000): 235–41. http://dx.doi.org/10.1016/s0020-0190(00)00059-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lee, Dik Lun, and Chun-Wu Leng. "Partitioned signature files: design issues and performance evaluation." ACM Transactions on Information Systems 7, no. 2 (April 1989): 158–80. http://dx.doi.org/10.1145/65935.65937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Lei, and Dai Ping Li. "Analysis Based on of Android Malicious Code Intrusion Detection." Advanced Materials Research 756-759 (September 2013): 3924–28. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3924.

Full text
Abstract:
Due to the android platform is open source, more and more developers and manufacturers to use it. At the same time its security attracts more and more challenges, it is vulnerable to mobile phone virus attacks. In order to solve these problems, we should detect the files in the phone. Because the Boyer-Moore algorithms efficiency is higher than others, so we use it in android application intrusion detection. First we should set up a virus signature library, and store these signatures in the SQLite Database. Then scanning system of documents carries on the analysis and extraction corresponding feature codes, and use the BM algorithm to match them with virus signature, and we can find the viruses. What is new and original in this paper is that the efficiency of intrusion detection is higher.
APA, Harvard, Vancouver, ISO, and other styles
23

Gayoso Martínez, Víctor, Fernando Hernández-Álvarez, and Luis Hernández Encinas. "An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes." Mathematics 8, no. 4 (April 2, 2020): 503. http://dx.doi.org/10.3390/math8040503.

Full text
Abstract:
The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other fragments of data from the same device or from different ones. Approximate matching functions, also called similarity preserving or fuzzy hashing functions, try to achieve that goal by comparing files and determining their resemblance. In this regard, ssdeep, sdhash, and LZJD are nowadays some of the best-known functions dealing with this problem. However, even though those applications are useful and trustworthy, they also have important limitations (mainly, the inability to compare files of very different sizes in the case of ssdeep and LZJD, the excessive size of sdhash and LZJD signatures, and the occasional scarce relationship between the comparison score obtained and the actual content of the files when using the three applications). In this article, we propose a new signature generation procedure and an algorithm for comparing two files through their digital signatures. Although our design is based on ssdeep, it improves some of its limitations and satisfies the requirements that approximate matching applications should fulfil. Through a set of ad-hoc and standard tests based on the FRASH framework, it is possible to state that the proposed algorithm presents remarkable overall detection strengths and is suitable for comparing files of very different sizes. A full description of the multi-thread implementation of the algorithm is included, along with all the tests employed for comparing this proposal with ssdeep, sdhash, and LZJD.
APA, Harvard, Vancouver, ISO, and other styles
24

Dervos, D., Y. Manolopoulos, and P. Linardis. "Ranking the validity of block candidacies in signature files." Information Sciences 79, no. 1-2 (July 1994): 89–108. http://dx.doi.org/10.1016/0020-0255(94)90041-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Jeong-Ki, and Jae-Woo Chang. "Horizontally divided signature files on a parallel machine architecture." Journal of Systems Architecture 44, no. 9-10 (June 1998): 723–35. http://dx.doi.org/10.1016/s1383-7621(97)00015-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kocberber, Seyit, and Fazli Can. "Partial evaluation of queries for bit-sliced signature files." Information Processing Letters 60, no. 6 (December 1996): 305–11. http://dx.doi.org/10.1016/s0020-0190(96)00176-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

El Mane, Adil, Younes Chihab, and Redouan Korchiyne. "Digital Signature for data and documents using operating PKI certificates." SHS Web of Conferences 119 (2021): 07004. http://dx.doi.org/10.1051/shsconf/202111907004.

Full text
Abstract:
This report represents my researching work for a six-month internship in Lex Persona Enterprise. "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research. This project brings together many applications related to compliance with well-specified programming constraints to sign files electronically. The research has the goal of signing PDF documents digitally using the hash-and-sign method. The SHA-256 function as the hash function and RSA as encryption algorithm, accompanied with PKI certificates type X.509. The link between the applications and the certificates is the cryptographic API PKCS #11. This humbled work got dedicated to smartphones and computers. The use of WebView in all applications provides a taste of consistency. This article presents several processes carried out to accomplish this work.
APA, Harvard, Vancouver, ISO, and other styles
28

Yamakawa, Yoshihiro, Masao Fuketa, Kazuhiro Morita, and Jun-ichi Aoe. "A method for improving full text search using signature files." International Journal of Computer Mathematics 77, no. 1 (January 2001): 73–88. http://dx.doi.org/10.1080/00207160108805051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ishikawa, Yoshiharu, Hiroyuki Kitagawa, and Nobuo Ohbo. "Evaluation of signature files as set access facilities in OODBs." ACM SIGMOD Record 22, no. 2 (June 1993): 247–56. http://dx.doi.org/10.1145/170036.170076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Magnini, Vincent P., and Earl D. Honeycutt. "Use of E-Mail Signature Files in the Hotel Industry." Cornell Hospitality Quarterly 50, no. 4 (July 24, 2009): 510–19. http://dx.doi.org/10.1177/1938965509340769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

IM, Byoung-Mo, Myoung Ho Kim, Jae Soo Yoo, and Kil Seong Choi. "Dynamic construction of signature files based on frame sliced approach." Data & Knowledge Engineering 30, no. 2 (June 1999): 101–20. http://dx.doi.org/10.1016/s0169-023x(99)00006-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bozanis, P., C. Makris, and A. Tsakalidis. "Parametric Weighted Filter: An Efficient Dynamic Manipulation of Signature Files." Computer Journal 38, no. 6 (January 1, 1995): 479–88. http://dx.doi.org/10.1093/comjnl/38.6.479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Woo Chang, Jae, and Yoon Joon Lee. "Design and evaluation of multikey access methods using signature files." Microprocessing and Microprogramming 33, no. 1 (September 1991): 9–19. http://dx.doi.org/10.1016/0165-6074(91)90011-h.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

An, Hai Ning, and Zi Yu Cheng. "Design of E-Archives Portfolio System Based on Signature Technology." Applied Mechanics and Materials 519-520 (February 2014): 32–35. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.32.

Full text
Abstract:
Electronic archive files have its advantage on speedy Operation relative to the archive file, however, it is hard to prevent tampering and safe for the file. The E-archives digital signature technology is very important for the Electronic information security. We analysis needs for the system, and design system solutions after the comparing various Signature and Encryption Technology, and propose function and design for the main module. Besides, there is the detailed design on the User registration, DEA file structure.
APA, Harvard, Vancouver, ISO, and other styles
35

Jung, Dong-Seob, Sang-Joon Lee, and Ieck-Chae Euom. "ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files." Symmetry 12, no. 10 (September 30, 2020): 1621. http://dx.doi.org/10.3390/sym12101621.

Full text
Abstract:
Malicious codes may cause virus infections or threats of ransomware through symmetric encryption. Moreover, various bypassing techniques such as steganography, which refers to the hiding of malicious code in image files, have been devised. Unknown or new malware hidden in an image file in the form of malicious code is difficult to detect using most representative reputation- or signature-based antivirus methods. In this paper, we propose the use of ImageDetox method to neutralize malicious code hidden in an image file even in the absence of any prior information regarding the signatures or characteristics of the code. This method is composed of four modules: image file extraction, image file format analysis, image file conversion, and the convergence of image file management modules. To demonstrate the effectiveness of the proposed method, 30 image files with hidden malicious codes were used in an experiment. The malicious codes were selected from 48,220 recent malicious codes purchased from VirusTotal (a commercial application programming interface (API)). The experimental results showed that the detection rate of viruses was remarkably reduced. In addition, image files from which the hidden malicious code had previously been removed using a nonlinear transfer function maintained nearly the same quality as that of the original image; in particular, the difference could not be distinguished by the naked eye. The proposed method can also be utilized to prevent security threats resulting from the concealment of confidential information in image files with the aim of leaking such threats.
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Gang, Yan Xiang Lou, and Sheng Li Liu. "Data Integrity Check and Repair in Design and Manufacture of Distributed Storage Network." Advanced Materials Research 548 (July 2012): 753–57. http://dx.doi.org/10.4028/www.scientific.net/amr.548.753.

Full text
Abstract:
When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techniques of data integrity. In this paper, we consider how to implement data integrity check by a third party auditor (TPA) in a distributed storage network, with the help of BLS signature. We also consider how the distributed storage network restores data when some server fails or some server crushes down. We present a data integrity check and repair (DICR) scheme, which makes use of a random linear code for data restoration and BLS signature to implement data integrity check. Our scheme is robust in the way that the storage network can reconstruct the data when a limited number of servers fail. In the mean time, public auditing on the storage network liberates clients from computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
37

YAMAJI, Kazutsuna, Toshiyuki KATAOKA, Naoto MIYACHI, and Noboru SONEHARA. "Application of the Long Term Signature to Office Open XML files." Joho Chishiki Gakkaishi 20, no. 1 (2010): 1–14. http://dx.doi.org/10.2964/jsik.19-300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kocberbera, Seyit, and Fazli Can. "Vertical framing of superimposed signature files using partial evaluation of queries." Information Processing & Management 33, no. 3 (May 1997): 353–76. http://dx.doi.org/10.1016/s0306-4573(96)00073-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Noroozi, Erfaneh, Salwani Bt Mohd Daud, Ali Sabouhi, and Mohammad Reza Salehnamadi. "New Algorithm to Reduce File Size and Bandwidth of Hashed Digital Signature for Image Steganography Using LSB." Advanced Materials Research 980 (June 2014): 194–97. http://dx.doi.org/10.4028/www.scientific.net/amr.980.194.

Full text
Abstract:
In computer cryptography, digital signature is one of the best cryptography systems. Public-private keys are used to pass sensitive information however it can also be used to provide authentication on the particulars of a sender. Proposed algorithm is a new design and simple implementation mechanism for producing a digital signature. Some applications such as multi agent systems transferred data with small size and capacity. The new scheme minimizes the size of original file and gives us a dynamic and smaller hashed message output. In this algorithm load the original files then hashed the message and encode it with the private key of sender. Finally modify the established code into a unique digital signature at Base 16. We concentrate on designing and implementation of functions of algorithm.
APA, Harvard, Vancouver, ISO, and other styles
40

Machut-Kowalczyk, Joanna. "Między krzyżykiem a kółkiem. Niepiśmienny w aktach wydziału pojednawczego i policji prostej sądu pokoju w Zgierzu i Łodzi z lat 1844–1876." Krakowskie Studia z Historii Państwa i Prawa 14, no. 1 (2021): 1–15. http://dx.doi.org/10.4467/20844131ks.21.001.13268.

Full text
Abstract:
Between the Cross and the Circle. Illiterates in the Records of the Conciliation Department and the Simple Police of the Peace Court in Zgierz and Łódź 1844–1876 The law in the Kingdom of Poland regulated the use of alternative forms of signature. The files of the courts of peace in Zgierz and Łódźabound in examples of their use. In guardianship documents, we most often find three crosses in lieu of a signature (in applications) or a mention of the illiteracy of the participants in the proceedings (minutes of meetings and resolutions). In the simple police department’s cases, Christians signed with crosses, while Jews drew three circles or signed in Hebrew. In each case, the official (a person witnessing the ‘signature’) attested that the signs were made by a specific person.
APA, Harvard, Vancouver, ISO, and other styles
41

Kok, S., Azween Abdullah, NZ Jhanjhi, and Mahadevan Supramaniam. "Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm." Computers 8, no. 4 (November 1, 2019): 79. http://dx.doi.org/10.3390/computers8040079.

Full text
Abstract:
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes data unrecoverable once the victim’s files have been encrypted. Therefore, in this research, it was proposed that machine learning is used to detect crypto-ransomware before it starts its encryption function, or at the pre-encryption stage. Successful detection at this stage is crucial to enable the attack to be stopped from achieving its objective. Once the victim was aware of the presence of crypto-ransomware, valuable data and files can be backed up to another location, and then an attempt can be made to clean the ransomware with minimum risk. Therefore we proposed a pre-encryption detection algorithm (PEDA) that consisted of two phases. In, PEDA-Phase-I, a Windows application programming interface (API) generated by a suspicious program would be captured and analyzed using the learning algorithm (LA). The LA can determine whether the suspicious program was a crypto-ransomware or not, through API pattern recognition. This approach was used to ensure the most comprehensive detection of both known and unknown crypto-ransomware, but it may have a high false positive rate (FPR). If the prediction was a crypto-ransomware, PEDA would generate a signature of the suspicious program, and store it in the signature repository, which was in Phase-II. In PEDA-Phase-II, the signature repository allows the detection of crypto-ransomware at a much earlier stage, which was at the pre-execution stage through the signature matching method. This method can only detect known crypto-ransomware, and although very rigid, it was accurate and fast. The two phases in PEDA formed two layers of early detection for crypto-ransomware to ensure zero files lost to the user. However in this research, we focused upon Phase-I, which was the LA. Based on our results, the LA had the lowest FPR of 1.56% compared to Naive Bayes (NB), Random Forest (RF), Ensemble (NB and RF) and EldeRan (a machine learning approach to analyze and classify ransomware). Low FPR indicates that LA has a low probability of predicting goodware wrongly.
APA, Harvard, Vancouver, ISO, and other styles
42

Weng, Wen Yong, Jian Su, Xiao Jie Yang, and Zhe Bing Wang. "Offline Data Sharing Model Based on Encrypted XML Files." Advanced Materials Research 488-489 (March 2012): 1574–81. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1574.

Full text
Abstract:
A confidentiality system generally needs to operate under a non-network environment. Hence, the adoption of an offline model is necessary to realize data sharing. An offline data-sharing model based on encrypted Extensible Markup Language (XML) files is designed. The combination of various techniques, such as XML mode, XML encryption, and XML signature, and the introduction of the Security Solution Support Center enable the proposed model to achieve a safe point-to-point data interactive mode and a security-based software module. The software system based on this model can ensure that data files generated from the data provider could only be identified and verified by the authorized data receiver.
APA, Harvard, Vancouver, ISO, and other styles
43

Liu, Yong Qing, and Jin Ding Cai. "Study on Collaborative Design for Distribution Engineering Based on CAD and Knowledge Management." Applied Mechanics and Materials 241-244 (December 2012): 2133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2133.

Full text
Abstract:
In construction of CSCD system for distribution engineering, there existed two main problems: the design security control, the call speed and reuse efficiency of CAD drawings. This paper has designed the electronic signature and the electronic seal, the decision program of validity of CAD files to solve the security problem after the risks in their circulating process were analyzed. Furthermore, the three-layer distribution network topological structure, the Classified and layered storage methods, the smart client and the knowledge push methods of CAD files have been developed to increase the call speed and reuse efficiency. The technical methods have been verified feasible in the practical operation of FJCD system.
APA, Harvard, Vancouver, ISO, and other styles
44

Azhan, Nor Amira Nor, Richard Adeyemi Ikuesan, Shukor Abd Razak, and Victor R. Kebande. "Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis." Electronics 11, no. 9 (May 3, 2022): 1468. http://dx.doi.org/10.3390/electronics11091468.

Full text
Abstract:
The popularity of unique image compression features of image files opens an interesting research analysis process, given that several digital forensics cases are related to diverse file types. Of interest has been fragmented file carving and recovery which forms a major aspect of digital forensics research on JPEG files. Whilst there exist several challenges, this paper focuses on the challenge of determining the co-existence of JPEG fragments within various file fragment types. Existing works have exhibited a high false-positive rate, therefore rendering the need for manual validation. This study develops a technique that can identify the unique signature of JPEG 8 × 8 blocks using the Error Level Analysis technique, implemented in MATLAB. The experimental result that was conducted with 21 images of JFIF format with 1008 blocks shows the efficacy of the proposed technique. Specifically, the initial results from the experiment show that JPEG 8 × 8 blocks have unique characteristics which can be leveraged for digital forensics. An investigator could, therefore, search for the unique characteristics to identify a JPEG fragment during a digital investigation process.
APA, Harvard, Vancouver, ISO, and other styles
45

Al-Qaisi, Aws, Saleh A. Khawatreh, Ahmad A. Sharadqah, and Ziad A. Alqadi. "Wave File Features Extraction using Reduced LBP." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2780. http://dx.doi.org/10.11591/ijece.v8i5.pp2780-2787.

Full text
Abstract:
<p>In this work, we present a novel approach for extracting features of a digital wave file. This approach will be presented, implemented and tested. A signature or a key to any wave file will be created. This signature will be reduced to minimize the efforts of digital signal processing applications. Hence, the features array can be used as key to recover a wave file from a database consisting of several wave files using reduced Local binary patterns (RLBP). Experimental results are presented and show that The proposed RLBP method is at least 3 times faster than CSLBP method, which mean that the proposed method is more efficient.</p>
APA, Harvard, Vancouver, ISO, and other styles
46

Qiu, Jing, Xiaoxu Geng, and Guanglu Sun. "Compressed Firmware Classification Based on Extra Trees and Doc2Vec." Scientific Programming 2021 (December 22, 2021): 1–9. http://dx.doi.org/10.1155/2021/2666153.

Full text
Abstract:
Firmware formats vary from vendor to vendor, making it difficult to track which vendor or device the firmware belongs to, or to identify the firmware used in an embedded device. Current firmware analysis tools mainly distinguish firmware by static signatures in the firmware binary code. However, the extraction of a signature often requires careful analysis by professionals to obtain it and requires a significant investment of time and effort. In this paper, we use Doc2Vec to extract and process the character information in firmware, combine the file size, file entropy, and the arithmetic mean of bytes as firmware features, and implement the firmware classifier by combining the Extra Trees model. The evaluation is performed on 1,190 firmware files from 5 router vendors. The accuracy of the classifier is 97.18%, which is higher than that of current approaches. The results show that the proposed approach is feasible and effective.
APA, Harvard, Vancouver, ISO, and other styles
47

Kang, Peng, Wenzhong Yang, and Jiong Zheng. "Blockchain Private File Storage-Sharing Method Based on IPFS." Sensors 22, no. 14 (July 7, 2022): 5100. http://dx.doi.org/10.3390/s22145100.

Full text
Abstract:
Under the current national network environment, anyone can participate in publishing. As an important information resource, knowledge files reflect the workload of publishers. Moreover, high-quality knowledge files can promote the progress of society. However, pirated inferior files have the opposite effect. At present, most organizations use centralized servers to centrally manage the knowledge files released by users. In addition, it is necessary to introduce an untrusted third party to examine and encrypt the contents of files, which leads to an opaque process of file storage transactions, tampering with intellectual copyright, and the inability to have consistent systems of file management among institutions due to the lack of uniform standards for the same intellectual files. The purpose of this paper is to ensure the safe storage of knowledge files on the one hand and to realize efficient sharing of copyrighted files on the other hand. Therefore, this paper combines NDN (Named Data Network) technology with a distributed blockchain and an Interplanetary File System (IPFS) and proposes a blockchain knowledge file storage and sharing method based on an NDN. The method uses the NDN itself for the file content signature and encryption, thereby separating the file security and transmission process. At the same time, the method uses a flexible NDN reverse path forwarding and routing strategy, combining an IPFS private storage network to improve the safety of the encrypted data storage security. Finally, the method takes advantage of all participating nodes consensus and shares files in the synchronized blockchain to ensure traceability. This paper introduces the structure and principles of the method and describes the process of file upload and transfer. Finally, the performance of the method is compared and evaluated, and the advantages and disadvantages of the method and the future research direction are summarized.
APA, Harvard, Vancouver, ISO, and other styles
48

Yadav, Arun Kumar, Divakar Yadav, and Rajesh Prasad. "Efficient Textual Web Retrieval using Wavelet Tree." International Journal of Information Retrieval Research 6, no. 4 (October 2016): 16–29. http://dx.doi.org/10.4018/ijirr.2016100102.

Full text
Abstract:
Searching on the web is one of the most progressive and expanding field nowadays. A large amount of information is available on the World Wide Web, motivating the need of efficient text indexing method that support fast text retrieval. In the past, two main indexing techniques: Signature files and Inverted files have been proposed. First require much larger space to store index and are more expensive to construct and update than inverted files. Second has been efficiently implemented using different structures like Sorted array and B-Tree. Sorted array was very expensive in updating the indices while appending a new keyword and B-tree method breaks down if there are many words with the same prefix. This paper presents a modified index structure for text retrieval that keeps a good result to optimize the space needed to store and time to search document. The proposed index is designed using the Wavelet Tree (WT), which was originally designed as wavelet transform for images. Experimental results show that on increasing the query length, the WT based index performs better than others.
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Long, and Xiao Yin Yi. "A Flexible Authentication Scheme with Supporting Multiple Granularity of Data Integrity." Applied Mechanics and Materials 536-537 (April 2014): 489–93. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.489.

Full text
Abstract:
To extend the flexibility of data integrity verification method,adapted to the different verification environment, proposed an improved solution that can support multi-granularity.It organizes files into three kinds of granularity such as data blocks,data sub-blocks and basic-blocks,basic-block realize data gathered to form data sub-block.Sign in the data sub-block,using signature of the sub-block to generate signature of block. Improvement program can achieve the verification of data blocks and sub-blocks. Validation of data block can reduce the data traffic in the validation process,two particle combination can improve the overall efficiency.In the proposed layered merkel hash tree is put forward,the dynamic operation can be supported by the sub-block or the block.Securitycommunication performance analysis show that the improvement program is effective and has a better practicability
APA, Harvard, Vancouver, ISO, and other styles
50

Ye, Ning, Hengfu Yin, Jingjing Liu, Xiaogang Dai, and Tongming Yin. "GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature." BioMed Research International 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/853734.

Full text
Abstract:
The huge amount of gene expression data generated by microarray and next-generation sequencing technologies present challenges to exploit their biological meanings. When searching for the coexpression genes, the data mining process is largely affected by selection of algorithms. Thus, it is highly desirable to provide multiple options of algorithms in the user-friendly analytical toolkit to explore the gene expression signatures. For this purpose, we developed GESearch, an interactive graphical user interface (GUI) toolkit, which is written in MATLAB and supports a variety of gene expression data files. This analytical toolkit provides four models, including the mean, the regression, the delegate, and the ensemble models, to identify the coexpression genes, and enables the users to filter data and to select gene expression patterns by browsing the display window or by importing knowledge-based genes. Subsequently, the utility of this analytical toolkit is demonstrated by analyzing two sets of real-life microarray datasets from cell-cycle experiments. Overall, we have developed an interactive GUI toolkit that allows for choosing multiple algorithms for analyzing the gene expression signatures.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography