The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Space Information Network (SIN) plays an important role in civil and national defense field, and it is highly emphasized by governments. Data transmitted and processed in SIN is massive and dynamic, which is collected by entities in the space. However, with the widely development of SIN, data security in storage and communication is facing a great challenge, and network-based attacks would leak top-secret...
Generation-based network coding is an important realization of network coding in practical networks. Due to the special data processing of generations, it is not only faced with intra-generation pollution attacks, but also is vulnerable to inter-generation pollution attacks. To solve this problem, we propose new homomorphic signature schemes for generationbased network coding. By means of the lattice...
In Ubiquitous Healthcare System (U-Healthcare), authentication is an essential task for secure medical information transmissions. In a recent paper, Kim proposed a smartcardbased authentication scheme for privacy preservation in UHealthcare. This scheme can protect user context privacy and is believed to have many abilities to resist a range of attacks, even though the secret data stored on the smartcard...
We provide a spatial encryption scheme with security against selectively chosen vectors and adaptively chosen ciphertext attacks (IND-sCV-CCA2). It is very useful in the Mobile e-Health Network. Compared with the underlying Boneh-Hamburg spatial encryption that proves to be selectively secure against chosen plaintext attacks (CPA), our construction achieves better security result with marginal additional...
Signcryption is a useful cryptographic primitive which simultaneously performs encryption and signature with cost less than the signature-then-encryption approach. Identity-based signcryption (IBSC) eliminates the complicated management of certificates in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Most IBSC schemes are constructed in the random oracle model, while...
Vehicular ad hoc networks (VANETs) have recently attract extensive attentions as a promising technology for improving traffic safety and efficiency. To make VANETs practical, security, privacy and efficiency are important issues. Anonymity preserving of group signature and lower overhead in verification of batch signature make these two kinds of signatures right tools to design VANET communication...
Vehicular ad hoc networks (VANETs) are being designed to convenience traffic, keep safety and provide services to drivers. To meet this goal, the vehicles involved should be trustworthy which eagerly needs valid V2V, V2I, I2V authentication. As to the authentication models used in VANETs, many organizations and research centers have done lots of work. The latest authentication models used in VANETs...
Secure and fine-grained access control could hardly be guaranteed in today's centralized social networks which imply to totally delegate to the social networking management system the administration of user data. This paper presents an access control scheme based on relation declaration. In this scenario, social networking sites provide basic applications of social service while users' resources are...
Some security-sensitive fields like military scenarios are the main application areas of ad hoc networks. In those areas, security issues have to be considered seriously for the network. In this paper, a key management method based on the combined public key is proposed for ad hoc networks. Through this method, private and public key pairs can be distributed to nodes of ad hoc networks efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.