The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, due to the popularity and convenience of wireless communications, people communicate with others by using mobile phones almost every day, as one of their important daily activities. Currently, LTE-4G is the mainstream of mobile communication. Recent studies on the upcoming LTE-5G wireless environments employ AES to protect delivered messages. However, using this cryptography standard to encrypt/decrypt...
The Mobile Instant Messaging Service (MIMS) is a popular feature on mobile communication devices today. It is a powerful and cheap facility to send and to receive messages through a handheld portable tool. Currently, many MIMS applications are available to support humans' activities in their everyday life. However, the security of this service needs to be increased for further applications such as...
In mobile communication, messages are delivered via the air. This may attract hackers to eavesdrop and then break them. Hence, the security is an important issue needed to be addressed. Advanced Standard Encryption (AES) is currently a frequently used encryption approach. However, AES will be insecure in the near future since it has been partially solved. Therefore, in this paper, we present a security...
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized...
This paper proposes a safety assistant, named wandering path tracking and fall detection system (PTFaD for short), which is a smartphone-based system monitoring people with dementia for both indoor and outdoor. The whole system comprises wandering path tracking and fall detection, safety-zone monitoring, communication services, alert notifications, and emergency medical services. To effectively track...
In this paper, we propose the wireless shopping scheme, called the Secure Mobile Shopping System (SMoSS for short), which is a secure and convenient wireless shopping environment, and in which we can safely create and perform our credit-card transaction by coordinating the cash flow of a trading system and credit card entities, without requiring additional restrictions and resources on the cash flow...
XIn this paper, we propose a novel traffic control scheme, called the secure traffic control system (STCS for short), which can guide an ambulance to safely navigate so as to shorten the attendant time, and safely and fastly deliver patients to hospitals. In addition, we add an exception handling mechanism to the STCS. With this mechanism when an ambulance encounters unforeseen situations, it can...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
Today the quick development of computers and networks not only enriches our everyday life, but also provides us with a convenient living environment. However, hackers are everywhere in the world. Hence, our sensitive data need to be securely protected. Currently, AES and DES as the most widely used block ciphering mechanisms are popularly employed to encrypt important data. But DES was publicly cracked...
In January, 1999, distributed.net and the Electronic Frontier Foundation collaborated with each other to break a DES key in 22 hours and 15 minutes, implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs true random numbers, the time parameters, and coated cipher text...
In this paper, we propose two block cipher modes of operation (BCMO for short), named the Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC for short), which differ from other existing BCMOs in that in the KSPC, the ciphertext block and in the ODC, the block cipher encryption unit's output are fed back to the encryption system to be one of the inputs of the next...
In this paper, we propose a new symmetric key exchange system, named the Wireless Security System with Data Connection Core (WiSDC for short), which can not only verify whether a user is a legitimate one or not, but also produce internally used parameters, named internal keys, and speed up the key exchange process for a wireless session as well. Moreover, the WiSDC adopts a pseudo random number generator,...
In this paper, we propose an authentication key management approach, called Diffie-Hellman-PKDS-based authentication method (DiHam for short) to improve current security level of facility authentication between IEEE802.16e's BS and SS by using a secret door asymmetric one-way function, PKDS. With the Initialization Vector transmitted between SS and BS, messages including those conveying user data...
Recently, wireless communication has been popularly used in our everyday life. However, its security is a crucial challenge since wireless messages are broadcasted in the air through which hackers can intercept the massages and realize what the contents of the messages are. That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertexts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.