The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-physical systems (CPS) have the great potential to transform people’s lives. Smart cities, smart homes, robot assisted living, and intelligent transportation systems are examples of popular CPS systems and applications. It is an essential but challenging requirement to offer secure and trustworthy real-time feedback to CPS users using spectrum sharing wireless networks. This requirement can...
The ubiquity of mobile devices have promoted the prosperity of mobile crowd systems, which recruit crowds to contribute their resources for performing tasks. Yet, due to the various resource consumption, the crowds may be reluctant to join and contribute information. Thus, the low participation level of crowds will be a hurdle that prevents the adoption of crowdsourcing. A critical challenge for these...
Chosen ciphertext security (CCA security) is a very important security notion for public key encryption. Until now, there are numerous ways to construct CCA secure public key encryption (PKE) or key encapsulation mechanism (KEM) schemes. In this paper, we propose a new CCA secure Elgmal scheme, which is proved secure in the random oracle based on the CDH assumption, has almost no additional overhead...
Using the ideas of game theory, L. H. Nguyen transformed two families of authentication protocols where the honest party transmitted some useless data with probability before the normal protocol run, so that even if an attacker attacks a protocol, the attacker's payoff will still be lower than when it does not. In such a way, the security of the protocol is guaranteed. However, this scheme suffers...
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit...
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enhanced security policies does not necessarily establish the mutual trust relationship ultimately, and even has a negative effect on the usability and acceptability of DRM system. Therefore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.