English  |  正體中文  |  简体中文  |  Items with full text/Total items : 56552/90363 (63%)
Visitors : 11820629      Online Users : 141
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/73378

    Title: A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection
    Authors: Hwang, Shin-Jia;Chen, Kuang-Hsi
    Contributors: 淡江大學資訊工程學系
    Keywords: Compilers;distributed system;cumputer virus;digital signature;proxy signatures;automatic signatures.
    Date: 2005-03
    Issue Date: 2011-10-24 11:50:00 (UTC+8)
    Publisher: Los Alamitos, California:Institute of Electrical and Electronics Engineers (IEEE)
    Abstract: To detect any (unknown) virus, automatic signature schemes are proposed to be embedded in honestly-made compilers. But compiling load is centralized on the compiler makers. To distribute compiling load with the help of distributed servers, proxy automatic signature schemes are proposed for the distributed compilers. However, Lin and Jan's proxy automatic signature scheme is insecure and has length restriction of source programs. To remove these flaws, Hwang and Li also proposed their scheme. However, two signatures are used for the agreement of compiler makers and servers, respectively. But only the signature for the proxy agreement of compiler makers can be validated by anyone. To remove this inefficient flaw, a new efficient proxy automatic signature scheme is proposed. Except the efficient advantage, the proxy agreement being researched both by the compiler maker and servers can be validated by anyone at the same time. Only one signature is used to show the agreement. The correctness of compilers and executable programs can be validated without releasing source codes. Moreover the moderator can easily find out infection sources.
    Relation: Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, vol.1, pp.649-654
    DOI: 10.1109/AINA.2005.53
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Proceeding

    Files in This Item:

    File Description SizeFormat
    0769522491_1p649-654.pdf98KbAdobe PDF261View/Open
    A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems_英文摘要.docx摘要19KbMicrosoft Word133View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback