The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an identity-based dynamic authenticated group key agreement (DAGKA) protocol with following advantages. The algorithms of Setup and Join has only one round communication. There is no message exchange among members in Leave algorithm. Joining members cannot know previous session keys and leaving members cannot know future session keys. Its AKE-security is proved under Decisional...
Nowadays, many organizations or corporations, such as banks, hospitals, schools, etc., use third-party platform to send notifications or information to their customers or users. This communication model can be generalized to the publish/subscribe model. The publisher will send the content to the subscriber whenever there is any new content that matches the interest of the subscriber. However, the...
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos, or prevent users from embracing it. To achieve this goal, we propose a protocol, which contains a priori and posteriori countermeasures, to guarantee these features. The a priori process...
Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of three factors: 1) something users know—password; 2) something users have—smart card; and 3) something users are—biometric characteristics. This paper introduces an efficient generic framework for three-factor authentication...
This paper presents a one-round tripartite authenticated key agreement protocol based on certification from Weil pairing. 27 different authenticated keys can be shared in a single run of the protocol. Their properties of security and efficiency are discussed.
This paper finds the same framework underlying some designated verifier signature schemes: each of them can be seen as a message authentication code scheme (MAC) where the private key is generated by the Diffie-Hellman key agreement protocol. So all these schemes could have been very simply constructed. Utilizing this framework, we can modularly construct private designated verifier signature schemes...
SCADA systems are widely used in critical infrastructure sectors, including electricity generation and distribution, oil and gas production and distribution, and water treatment and distribution. SCADA process control systems are typically isolated from the internet via firewalls. However, they may still be subject to illicit cyber penetrations and may be subject to cyber threats from disgruntled...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
In multi-VM (virtual machine) environment, the virtual machine network management plays an important role. Traditional multi-VM management systems are accustomed to using the DHCP mechanism. However, with the development of virtual network technology, DHCP is not suitable for constructing the stable and transparent virtual network environment. In this paper, we propose a method of multi-VM automatic...
The fair exchange protocol is one of the most fundamental cryptographic tool in many security applications such as contract signing protocols, certified e-mail systems, and e-payment schemes. BLS short signature (due to Boneh, Lynn, and Shacham) is among the most popular cryptographic primitives in pairing-based cryptography. We propose a new fair exchange protocol which can be used to exchange BLS...
Aimed at the feature of various fieldbus standards and types as well as the selection and evaluation problems confronted with users, the entropy-ideal point method is used for reference in this paper. A fieldbus comprehensive evaluation and selection method that combined fieldbus technical features and based on fieldbus static performance index is proposed, and the corresponding evaluation model is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.