The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Noar and Shamir presented the concept of visual cryptography. Many researches following it go down the same track: to expand the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes worse. In order to prevent the pixels from expanding, Yang has proposed his probability-based visual secret sharing scheme, where the concept...
Mobile equipment (ME) playing an important role of bridge between wireless network and mobile user has been facing more and more security threats. Trusted mobile platform (TMP) was proposed by TCG (trusted computing group) as a new mechanism to enhance the security of the resource-constrained ME. In this paper, we embark a new study on constructing a TMP according to ME's feature, and performing mutual...
The developing next generation (4G) mobile communication system will offer us great convenience and huge opportunities of service creation with numerous security threats. As a critical security mechanism, user authentication and key agreement (AKA) schemes have received considerable attentions in recent years. In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the...
How to find essential features between normal stream and attack stream and identify the distributed denial of service (DDoS) attack online with simple algorithm are two critical issues in detecting DDoS attack which will contribute to identifying DDoS attack with low false positive and low false negative. According to the features of DDoS attack, a conception of one-way connection density (OWCD) and...
Future 4G mobile communication networks are expected to provide all IP-based services for heterogeneous wireless access technologies. Security service for mobile user as a major challenge in developing such 4G networks becomes more complicated to handle. Since the mobile equipment (ME) becomes ever more powerful but still remain open to possible attacks, the neglect of the security of ME in developing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.