Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents an identity-based dynamic authenticated group key agreement (DAGKA) protocol with following advantages. The algorithms of Setup and Join has only one round communication. There is no message exchange among members in Leave algorithm. Joining members cannot know previous session keys and leaving members cannot know future session keys. Its AKE-security is proved under Decisional...
Nowadays, many organizations or corporations, such as banks, hospitals, schools, etc., use third-party platform to send notifications or information to their customers or users. This communication model can be generalized to the publish/subscribe model. The publisher will send the content to the subscriber whenever there is any new content that matches the interest of the subscriber. However, the...
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos, or prevent users from embracing it. To achieve this goal, we propose a protocol, which contains a priori and posteriori countermeasures, to guarantee these features. The a priori process...
Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of three factors: 1) something users know—password; 2) something users have—smart card; and 3) something users are—biometric characteristics. This paper introduces an efficient generic framework for three-factor authentication...
This paper presents a one-round tripartite authenticated key agreement protocol based on certification from Weil pairing. 27 different authenticated keys can be shared in a single run of the protocol. Their properties of security and efficiency are discussed.
This paper finds the same framework underlying some designated verifier signature schemes: each of them can be seen as a message authentication code scheme (MAC) where the private key is generated by the Diffie-Hellman key agreement protocol. So all these schemes could have been very simply constructed. Utilizing this framework, we can modularly construct private designated verifier signature schemes...
SCADA systems are widely used in critical infrastructure sectors, including electricity generation and distribution, oil and gas production and distribution, and water treatment and distribution. SCADA process control systems are typically isolated from the internet via firewalls. However, they may still be subject to illicit cyber penetrations and may be subject to cyber threats from disgruntled...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
In multi-VM (virtual machine) environment, the virtual machine network management plays an important role. Traditional multi-VM management systems are accustomed to using the DHCP mechanism. However, with the development of virtual network technology, DHCP is not suitable for constructing the stable and transparent virtual network environment. In this paper, we propose a method of multi-VM automatic...
The fair exchange protocol is one of the most fundamental cryptographic tool in many security applications such as contract signing protocols, certified e-mail systems, and e-payment schemes. BLS short signature (due to Boneh, Lynn, and Shacham) is among the most popular cryptographic primitives in pairing-based cryptography. We propose a new fair exchange protocol which can be used to exchange BLS...
Aimed at the feature of various fieldbus standards and types as well as the selection and evaluation problems confronted with users, the entropy-ideal point method is used for reference in this paper. A fieldbus comprehensive evaluation and selection method that combined fieldbus technical features and based on fieldbus static performance index is proposed, and the corresponding evaluation model is...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.