The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
Researchers and engineers have paid more attention to cloud-based application systems, whose features are virtualization and services provisioning. Fortunately the technology can be just right to healthcare. Meanwhile, security has also become more challenging. Although many cloud-based RFID authentication protocols have been proposed, some of them only improve the function and performance without...
Radio Frequency Identification (RFID) is one of the key technologies for Internet of Things (IoT). Due to the limitations of processing capability, storage space and power supply of RFID tag, the traditional security mechanisms cannot be used directly. In addition, the existing security threats become more severe towards RFID authentication scheme. In this paper, we propose an Efficient Secure Lightweight...
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and...
In pairing-based cryptography, Miller's algorithm plays a key role in the calculation of pairing. Currently, most of the optimizations of Miller's algorithm are of serial structure. In this paper, we propose a parallel method for efficiently computing pairing. Our method can be applied to super singular elliptic curves and ordinary elliptic curves which are suitable for pairing-based cryptography...
A secure and efficient ID-based registration protocol with user anonymity is proposed in this paper for IP-based mobile networks. The protocol minimizes the registration delay through a minimal usage of the identity (ID)-based signature scheme that eliminates expensive pairing operations. User anonymity is achieved via a temporary identity (TID) transmitted by a mobile user, instead of its true identity...
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furthermore it solves the abuse using off-line trusted third party (TTP). The security and fairness are also possessed in the protocol.
In Piva et al's watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named "One Document to Multi-distributor" problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.