The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret communication has long been an import issue in recent years. To protect a secret, encryption is a general way to help owners encrypt the secret into meaningless information for non-owners in order to prevent secret leakage. Since fine-grained encryption provides more flexibility in information protection, it has drawn more attention in recent years, but effective methods are rare in this new...
In 2014, Choi proposed a security enhanced anonymous multi-server authenticated key agreement scheme using smart card and biometrics and claimed that their scheme could overcome all of security issues in Chuang-Chen's scheme, such as impersonation attack, smart card loss attack, denial of service attack and perfect forward secrecy. Unfortunately, we discover that Choi's proposed scheme is not only...
The Smart Home is based on the Wireless Sensor Network (WSN) and Embedded System (ES). The most important parts of the Smart Home are low-power and high-security. And it is very vulnerable to various attacks ether an active or passive one in WSN. We shed light upon some existing security flaws in W2 and ZigBee. Some are quite useful to defend the various attacks, but don't suit for the Smart Home...
Visual cryptography is a way to encrypt the secret image into several meaningless share images. Noted that no information can be obtained if not all of the shares are collected. Stacking the share images, the secret image can be retrieved. The share images are meaningless to owner which results in difficult to manage. Tagged visual cryptography is a skill to print a pattern onto meaningless share...
Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images. The authentication mechanism is a way to verify whether the reconstructed secret image is authentic. The general authentication might increase...
The new re-authentication protocol named SFR is proposed to make up for lack of authentication to access network in existing re-authentication protocol. One kind of key is generated using SKEY authentication algorithm in SFR. SFR is the parallel composition of sub-protocol SFR1 and SFR2. WLAN-UE and HAAA authenticate mutually in SFR1. WLAN-UE and WLAN-AN authenticate mutually in SFR2. The security...
Visual cryptography (VC) is widely used in secret communications without any computations. The past schemes rarely focused on the authentication issue before reconstructing the decrypted image. This paper provided an authentication mechanism for VC and the experiments confirmed its feasibility.
Lin and Tasi, Yang et al., and Chang et al.’s meaningful secret sharing schemes provided authentication mechanisms but none included a remedy ability that would cause the secret image never to be completely obtained while some information of the stego-images are losing or tampering with. This paper proposes a meaningful secret-sharing scheme which includes both authentication and remedy abilities...
Aiming at grid nets under the environment of mass, heterogeneous information task, distribution and dynamic characteristics, this paper discusses the principles to be followed firstly, then creates the operational missions information quality evaluation index system and the utility measure mode. The results can provide an authentication method for sharing and using the operational mission information...
A biometric system usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait at registration. As a result, it is essential to select several samples as templates. This paper proposes two algorithms maximum match scores (MMS) and greedy maximum match scores (GMMS) based on match scores for template selection and update...
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g., eight impressions of a person??s left index finger) at the stage of registration. As a result, it is essential to select several samples as templates. This paper proposes two algorithms maximum match scores (MMS) and greedy...
This paper proposes an invertible semi-fragile video watermarking algorithm using a hash function to authenticate the MPEG-4 video contents. The proposed algorithm embeds two watermarks into I frame while encoding YUV video to MPEG-4 format. One watermark using hash function aims to authenticate the contents and embed the frame number for manipulation location between frames, and the other one based...
The key technology of mobile value-added services is to design protocol, which can meet the poor computing power as well as being security. This paper proposes an Advanced-RPC protocol by adding hash function with key to the Lowe modified BAN concrete Andrew Secure RPC. The new protocol mends some undesirable properties in the old one, enhances forward security, and improves the running efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.