The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sharing photos through Online Social Networks isan increasingly popular fashion. However, it poses a seriousthreat to end users as private information in the photos maybeinappropriately shared with others without their consent. Thispaper proposes a design and implementation of a system using a dynamic privacy preserving partial image sharing technique (namely PUPPIES), which allows data owners to...
Basically, Differential Fault Analysis (DFA) against ciphers consists of two stages: fault induction and fault exploitation. Success rate of the latter strongly depends upon the availability of the required type of some faulty ciphertexts, which typically assumes that adversaries have precise control over the location, timing and/or even the type of the fault induced. In view of this, there seems...
In 2000, Shieh et al. proposed a digital multi-signature scheme for authenticating the delegates of mobile code systems. Later, Hwang and Li showed that a forgery attack against the Shieh et al. scheme could be successful. Chang and Chang improved the Shieh et al. scheme. Their proposed scheme effectively defends against potential attacks as pointed out by Hwang-Li. Later, Zhang proved that the Chang-Chang...
This paper presents a systematic Differential Fault Analysis (DFA) method on Feistel ciphers, the outcome of which closely links to that of the theoretical cryptanalysis with provable security. For this purpose, we introduce the notions of Fault Propagation Path (FPPath) and Fault Propagation Pattern (FPPattern). By this method, it can be programmed to automatically compute FPPaths and FPPatterns,...
The information technology changed rapidly, many business organizations such as public transportation or museum offer electronic ticket to instead of paper-based ticket. For owners, the main benefits are the stress-free nature or paperless tickets, specifically in eliminating the risks of tickets loss. Additionally,the aim is increasing use of electronic tickets. In this article, we discuss electronic...
Perceptual image hashing maps an image to a fixed length binary string based on the image's appearance to the human eye, and has applications in content authentication, watermarking and anti-piracy search. In this paper, we present a hash scheme that is robust and secure to non-malicious manipulation and sensitive to the malicious tampering. The algorithm is based on contourlet transform and singular...
The paper proposes a new secure inter-domain routing protocol, which is called identity-based inter-domain routing (id2r). id2r consists of an origin AS verification mechanism AT (assignment track) and an AS PATH verification mechanism IBAPV (identity-based aggregate path verification). The basic idea of AT is that all ASes must provide the assignment track and attestations of prefixes their originated,...
The paper proposes an identity-based aggregate path verification protocol (IBAPV) to provide authenticity for route announcements in the border gateway protocol (BGP) with a more efficient and easily deployed identity-based aggregate signature scheme instead of certificate-based scheme, which leads to performance and deployment matters of current proposals. Because in the identity-based cryptographic...
The paper proposes an ID-based Aggregate Path Verification protocol (IDAPV) to provide authenticity for route announcements in the Border Gateway Protocol (BGP) with a more efficient and easily deployed ID-based aggregate signature scheme instead of certificate-based scheme, which leads to performance and deployment matters of current proposals, and a secure key issuing protocol to hold the privacy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.