The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN) supports flexibly routing and switching by splitting the control plane and data plane in network devices. However, the security resource utilization now in SDN is inefficient, especially in the process of routing path construction. In this paper, we present a novel model for SDN controller to construct secure routing paths based on Network Security Virtualization...
In this paper, we propose an Identity-Based encryption (IBE) scheme and corresponding signature scheme with the feature of transmission route assurance. And then, we put forward a reforming method to make them more efficient and lightweight with the end-to-end feature, encouraging a broader range of application in ad-hoc networks. Based on these schemes, we present a new identity-based authentication...
In Ubiquitous Healthcare System (U-Healthcare), authentication is an essential task for secure medical information transmissions. In a recent paper, Kim proposed a smartcardbased authentication scheme for privacy preservation in UHealthcare. This scheme can protect user context privacy and is believed to have many abilities to resist a range of attacks, even though the secret data stored on the smartcard...
Software Defined Networking (SDN) is one of the typical flow-rule-driven networks. In SDN, a centralized controller dictates the network behavior and configures network devices with many flow rules, and the validity and consistency of flow rules could guarantee the normal operations in SDN. Therefore, SDN requires a secure and efficient mechanism to manage and authenticate flow rules between the application...
Most existing works to secure cloud devote to remote integrity check, search and computing on encrypted data. In this paper, we deal with simultaneous authentication and secrecy when data are uploaded to cloud. Observing that cloud is most interesting to companies in which multiple authorized employees are allowed to upload data, we propose a general framework for secure data upload in an identity-based...
Vehicular ad hoc networks (VANETs) are being designed to convenience traffic, keep safety and provide services to drivers. To meet this goal, the vehicles involved should be trustworthy which eagerly needs valid V2V, V2I, I2V authentication. As to the authentication models used in VANETs, many organizations and research centers have done lots of work. The latest authentication models used in VANETs...
The secure authentication and transaction is one of the important parts in networking security. Because of the security flaws of some existing schemes, this paper proposes a secure authentication and transaction protocol based on digital certificates and dynamic password. The protocol not only can realize the mutual authentication of the client and server, but also can achieve secure authentication...
A key management and authentication model is proposed based on elliptic curve combined public key scheme and threshold cryptosystem. In the initialization phase, a trusted authentication centre is needed, while in the operation phase, the key update, revocation, and the shared private-seed-key matrix update are self-organized. Based on the model, an authentication and key agreement protocol without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.