The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, due to the popularity and convenience of wireless communications, people communicate with others by using mobile phones almost every day, as one of their important daily activities. Currently, LTE-4G is the mainstream of mobile communication. Recent studies on the upcoming LTE-5G wireless environments employ AES to protect delivered messages. However, using this cryptography standard to encrypt/decrypt...
In mobile communication, messages are delivered via the air. This may attract hackers to eavesdrop and then break them. Hence, the security is an important issue needed to be addressed. Advanced Standard Encryption (AES) is currently a frequently used encryption approach. However, AES will be insecure in the near future since it has been partially solved. Therefore, in this paper, we present a security...
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized...
In this paper, we propose the wireless shopping scheme, called the Secure Mobile Shopping System (SMoSS for short), which is a secure and convenient wireless shopping environment, and in which we can safely create and perform our credit-card transaction by coordinating the cash flow of a trading system and credit card entities, without requiring additional restrictions and resources on the cash flow...
XIn this paper, we propose a novel traffic control scheme, called the secure traffic control system (STCS for short), which can guide an ambulance to safely navigate so as to shorten the attendant time, and safely and fastly deliver patients to hospitals. In addition, we add an exception handling mechanism to the STCS. With this mechanism when an ambulance encounters unforeseen situations, it can...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
Today the quick development of computers and networks not only enriches our everyday life, but also provides us with a convenient living environment. However, hackers are everywhere in the world. Hence, our sensitive data need to be securely protected. Currently, AES and DES as the most widely used block ciphering mechanisms are popularly employed to encrypt important data. But DES was publicly cracked...
In January, 1999, distributed.net and the Electronic Frontier Foundation collaborated with each other to break a DES key in 22 hours and 15 minutes, implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs true random numbers, the time parameters, and coated cipher text...
In this paper, we propose two block cipher modes of operation (BCMO for short), named the Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC for short), which differ from other existing BCMOs in that in the KSPC, the ciphertext block and in the ODC, the block cipher encryption unit's output are fed back to the encryption system to be one of the inputs of the next...
In this paper, we propose a new symmetric key exchange system, named the Wireless Security System with Data Connection Core (WiSDC for short), which can not only verify whether a user is a legitimate one or not, but also produce internally used parameters, named internal keys, and speed up the key exchange process for a wireless session as well. Moreover, the WiSDC adopts a pseudo random number generator,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.