Learn More
Intrusion detection is commonly regarded as the classification problem. The paper presents a new clustering model based on deterministic annealing algorithm to detect intrusion. In our model, each user is considered as a discrete stationary source with variable memory. A sequence of characters composed of command lines from a user's account is regarded as(More)
Elliptic Curve Cryptography (ECC) has found wide applications in smart cards and embedded systems. Point multiplication plays a critical role in ECC. Many efficient point multiplication methods have been proposed. One of them is the comb method [5] which is much more efficient than other methods if precomputation points are calculated in advance or(More)
In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which have an advantage in performing point multiplication while keeping the security of ECC over finite fields. We give a method to select(More)
  • 1