期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A study on dynamic group signature scheme with threshold traceability for blockchain
1
作者 Hyo-jin Song Teahoon Kim +2 位作者 Yong-Woon Hwang Daehee Seo Im-Yeong Lee 《High-Confidence Computing》 EI 2024年第2期73-81,共9页
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants.However,single-signature applications in transactions c... Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants.However,single-signature applications in transactions can lead to user identification issues due to the reuse of public keys.To address this issue,group signatures can be used,where the same group public key is used to verify signatures from group members to provide anonymity to users.However,in dynamic groups where membership may change,an attack can occur where a user who has left the group can disguise themselves as a group member by leaking a partial key.This problem cannot be traced back to the partial key leaker.In this paper,we propose assigning different partial keys to group members to trace partial key leakers and partially alleviate the damage caused by partial key leaks.Exist schemes have shown that arbitrary tracing issues occurred when a single administrator had exclusive key generation and tracing authority.This paper proposes a group signature scheme that solves the synchronization problem by involving a threshold number of TMs while preventing arbitrary tracing by distributing authority among multiple TMs. 展开更多
关键词 Blockchain Group signature PRIVACY ANONYMITY TRACEABILITY
原文传递
An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis 被引量:1
2
作者 Vannel Zeufack Donghyun Kim +1 位作者 Daehee Seo Ahyoung Lee 《High-Confidence Computing》 2021年第2期1-6,共6页
Nowadays,in almost every computer system,log files are used to keep records of occurring events.Those log files are then used for analyzing and debugging system failures.Due to this important utility,researchers have ... Nowadays,in almost every computer system,log files are used to keep records of occurring events.Those log files are then used for analyzing and debugging system failures.Due to this important utility,researchers have worked on finding fast and efficient ways to detect anomalies in a computer system by analyzing its log records.Research in log-based anomaly detection can be divided into two main categories:batch log-based anomaly detection and streaming log-based anomaly detection.Batch log-based anomaly detection is computationally heavy and does not allow us to instantaneously detect anomalies.On the other hand,streaming anomaly detection allows for immediate alert.However,current streaming approaches are mainly supervised.In this work,we propose a fully unsupervised framework which can detect anomalies in real time.We test our framework on hdfs log files and successfully detect anomalies with an F-1 score of 83%. 展开更多
关键词 Anomaly detection Unsupervised machine learning Clustering OPTICS Log analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部