Visible to the public Biblio

Filters: Author is Zeng, Peng  [Clear All Filters]
2017-08-22
Shang, Wenli, Cui, Junrong, Wan, Ming, An, Panfeng, Zeng, Peng.  2016.  Modbus Communication Behavior Modeling and SVM Intrusion Detection Method. Proceedings of the 6th International Conference on Communication and Network Security. :80–85.

The security and typical attack behavior of Modbus/TCP industrial network communication protocol are analyzed. The data feature of traffic flow is extracted through the operation mode of the depth analysis abnormal behavior, and the intrusion detection method based on the support vector machine (SVM) is designed. The method analyzes the data characteristics of abnormal communication behavior, and constructs the feature input structure and detection system based on SVM algorithm by using the direct behavior feature selection and abnormal behavior pattern feature construction. The experimental results show that the method can effectively improve the detection rate of abnormal behavior, and enhance the safety protection function of industrial network.

2017-03-20
Chen, Siyuan, Zeng, Peng, Choo, Kim-Kwang Raymond.  2016.  A Provably Secure Blind Signature Based on Coding Theory. :376–382.

Blind signature can be deployed to preserve user anonymity and is widely used in digital cash and e-voting. As an interactive protocol, blind signature schemes require high efficiency. In this paper, we propose a code-based blind signature scheme with high efficiency as it can produce a valid signature without many loops unlike existing code-based signature schemes. We then prove the security of our scheme in the random oracle model and analyze the efficiency of our scheme. Since a code-based signature scheme is post-quantum cryptography, therefore, the scheme is also able to resist quantum attacks.

Chen, Siyuan, Zeng, Peng, Choo, Kim-Kwang Raymond.  2016.  A Provably Secure Blind Signature Based on Coding Theory. :376–382.

Blind signature can be deployed to preserve user anonymity and is widely used in digital cash and e-voting. As an interactive protocol, blind signature schemes require high efficiency. In this paper, we propose a code-based blind signature scheme with high efficiency as it can produce a valid signature without many loops unlike existing code-based signature schemes. We then prove the security of our scheme in the random oracle model and analyze the efficiency of our scheme. Since a code-based signature scheme is post-quantum cryptography, therefore, the scheme is also able to resist quantum attacks.