Changsha, China
Changsha, China

Time filter

Source Type

Qiang F.,Hunan Police Academy | Min T.,Hunan Police Academy | Yue Z.,Hunan Police Academy
Journal of Convergence Information Technology | Year: 2012

In order to meet the requirement of information society, governments of all countries are trying to establish a security system that can be monitored to combat criminals engaged in illegal activities such as using communication encryption technology and computer technology to carry out secret communication, and inhibit rampant computer crime. With the large-scale application of cryptographic techniques, countries have adopted various forms of key escrow policy. Key escrow technology aims to provide new access to acquiring information to decrypt key in an emergency. It is used to save the user's private key backup, which can help national security departments to obtain the original plaintext information when necessary and can also recovery ciphertext when the users lost and damage their own key. Recently years, it has been one of the hottest subjects in cryptology circle to find out a compromise between the protections of user privacy and ensuring the right of government agencies to monitor. In this paper, several typical key escrow schemes have been studied, including escrowed encryption standard, key recovery technology, applications of key escrow in PKI, etc., and the research development of key escrow technology in recent years has been analyzed.

Zhao W.,Hunan Police Academy | Wang N.,National University of Defense Technology
Applied Mechanics and Materials | Year: 2013

In this paper, a novel framework as a combination of Probability Collectives (PC) and Collaborative Optimization (CO) is proposed and detailed illustrated. The framework has a two-level structure which is similar to that of CO, but with the system level replaced by distributed PC based agents. This formulation maintains the advantage of CO while enhances the optimization and coordination ability at the system level. For better implementation, some adaption and improvement has been made to the origin PC method. The resultant PCCO framework shows satisfied performance in handling complex optimization problems with both efficiency and accuracy. © (2013)Trans Tech Publications, Switzerland.

Tang D.,Hunan Police Academy | Kuang X.-H.,Hunan Police Academy
Lecture Notes in Electrical Engineering | Year: 2013

The software development workload is subject to such factors as field, staff, technique, environment and strategy. Thus it is difficult to measure the workload accurately, especially the measurement conducted by a third party after the completion of a project. With the gait characteristic database as a subject, this paper puts forwards a new post hoc evaluation model for workload by using workload algorithm model and expert review method based on full understanding of the system's basic information. Practices have proven that this model increases evaluation flexibility and effects and corrects the subjective bias of experts. It is quite applicable to the post hoc evaluation of software development workload. © 2013 Springer Science+Business Media New York.

Zhang B.Y.,Hunan Police Academy
Applied Mechanics and Materials | Year: 2014

This paper describes the basic models of network security state evaluation system and concentrates on researching the situation assessment method with stochastic model. In the paper, which makes use of the Hidden Semi-Markov Model (HsMM), tries to simulate the operation of network system. The alert statistics, deriving from network defense system, is used as data sources to realize the evaluation of network security situation. HsMM modifies the HMM model concerning the hypothesis of some state-duration time in relation to exponential distribution, which coincides the description of the network system's operation in the real world. The experimental results imply that HsMM is an ideal security evaluation method. © (2014) Trans Tech Publications, Switzerland.

Fan Q.,Hunan Police Academy | Zhang M.,Hunan Police Academy | Zhang Y.,Hunan Police Academy
Przeglad Elektrotechniczny | Year: 2012

To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal privacy is a common problem. Assuming that there are two Escrow Agent groups (Escrow party), one is designated by the government, while the other is unofficial. The two groups can achieve mutual supervision and dependence, thus implementing monitoring for users by the cooperation rather than by only a single one. If the number of the mutual participation is less than the required threshold number, the monitoring cannot be achieved. Therefore, an equation set corresponding to the specific program can be constructed, for example, multiply i th equation and j th equation to get an (i+j) th equation. As long as this kind of equation set is established, various key escrow schemes involved by several Escrow Agent groups can be constructed. Nowadays, the increasing political, economic, and cultural exchanges all over the world will lead to more and more transnational crime and terrorist attacks, so this program can be adapted to the multinational (or multi-organization) key escrow cooperation.

Zhao W.,Hunan Police Academy | Wang N.,National University of Defense Technology
2013 3rd International Conference on Communications and Information Technology, ICCIT 2013 | Year: 2013

This paper motivates and describes the use of Response Surface (RS) with Probability Collectives (PC) to handle large-scale optimization problems. The main characteristic of PC is that it optimizes the probability distribution of the variables rather than their values, thus different types of variables may be integrated into optimization procedure. The RS is used to approximate the utility evaluation of candidate solutions in PC. To improve the approximation accuracy, the Trust Region (TR) method is introduced to iteratively update the RS during optimization. Extensive simulations are conducted to demonstrate the effectiveness of the proposed algorithm. © 2013 IEEE.

Yan X.,Hunan Police Academy
Journal of Convergence Information Technology | Year: 2011

The increasing network attacks reveal one of the fundamental security problems, this paper proposes against denial of services based on packet limiting algorithm. It has presented algorithms that help to detect and stop attacks and to trace the path to the attacker for obvious reasons. The algorithm tracks packet rates to and from subnets, then determine the route path. Experimental result shows that the proposed algorithm is effective.

Zhang P.,Hunan University | Li W.,Hunan Police Academy | Li W.,Changsha University | Sun H.,Changsha Medical University
PLoS ONE | Year: 2016

Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the tradeoff lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. © 2016 Zhang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Liu W.-Y.,Hunan Police Academy | Liu W.-Y.,National University of Defense Technology
Journal of Computational and Theoretical Nanoscience | Year: 2016

According to the disposal demand for packets and all kinds of constraints in the current condition, this paper discusses a modeling method of extended double-layer capacitated arc routing problems (Capacitated Arc Routing Problem, CARP) optimization model based on express logistics. The model is described in detail, and the solution of the model is discussed. The paper analyses and discusses the solution to complexity of the model, and proposes a better solution to the doublelayer CARP optimization model. According to the scheme, the paper chooses a sort of improved ant colony algorithm to solve the model. And the results show that the scheme is beneficial to controlling the cost of logistics links, to minimizing purchase cost, transportation cost and delivery time. The scheme plays a very imperative role in enhancing the competitiveness of enterprises. © 2016 American Scientific Publishers All rights reserved.

Yan X.,Hunan Police Academy
Proceedings - 2011 International Conference on Future Computer Sciences and Application, ICFCSA 2011 | Year: 2011

In view that the efficiency of computer forensics technology is insufficient and some other problems at present, a computer dynamic forensics method has been proposed based on BP neural network. This method has combined the advantages of artificial neural network in pattern recognition which can timely and accurately identify the network attack behaviors. On this basis, a prototype system with dynamic forensics has been designed. And the experiment has showed that this system has high detection rate for the network bad behaviors and the detection performance is superior to other pattern recognition methods. © 2011 IEEE.

Loading Hunan Police Academy collaborators
Loading Hunan Police Academy collaborators