Idology and Its Applications in Public Security and Network Security

  title={Idology and Its Applications in Public Security and Network Security},
  author={Shenghui Su and Jianhua Zheng and Shuwang L{\"u} and Zhiqiu Huang and Zhoujun Li and Zhenmin Tang},
Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity… 

Secure Email Login Based on Lightweight Asymmetric Identities

The new scheme adopts a lightweight asymmetric identity of a user account as a user login credentials, which can resist replay attack, birthday attack, dictionary attack, phishing website attack, and their combinatorial attacks.

Design of a Program Identification System for Preventing Malicious Codes

A program identification system which can actively and efficiently prevent malicious codes such as network worms and computer viruses from starting and running is proposed, and the advantage of this system is analyzed.



Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities

The authors analyze the defects of existent anti-forgery techniques, put forward the idea of applying a lightweight asymmetric identity to fraud guard, and design a drug anti-forgery and tracing

A Diploma Anti-forgery System Based on Lightweight Digital Signatures

  • Yue DaiShenghui Su
  • Computer Science
    2014 Tenth International Conference on Computational Intelligence and Security
  • 2014
The new system adds a resident ID number as the security trusted root to a digital identity, which effectively and thoroughly solves the diploma anti-forgery problem with low cost and low environmental pollution.

Cryptography and Network Security: Principles and Practice

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In

Forged and Counterfeit Documents

The role of forensic document examiners (FDEs) and the objective examinations they conduct in order to differentiate counterfeit or forged from genuine are focused on.

Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer

We present the first undeniable signature schemes where signers are unconditionally secure. In the efficient variants, the security for the recipients relies on a discrete logarithm assumption or on

A public key cryptosystem based on three new provable problems

RFID Systems and Security and Privacy Implications

The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes with research opportunities for experts in cryptography and information security.

Biometric identification

As people become more connected electronically, the ability to achieve a highly accurate automatic personal identification system is substantially more critical and organizations are looking to automated identity authentication systems to improve customer satisfaction and operating efficiency.

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.