The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights policy by using DRM agent. First, descriptions of extensible ODRL-based rights transfer policy were presented to complete OMA REL. Then, we introduced a remote attestation mechanism among...
Secure and efficient key management in ad hoc networks is a challenging task for the researches due to the special properties of ad hoc networks. Based on a self-organized key management protocol TIDS, this paper presents a new key management approach using Id-based multi-signcryption and threshold cryptography. To illuminate our approach concretely, a client??s private key update protocol in ad hoc...
Multicasting is an important business in the field of the wireless local area network (WLAN). The access point (AP) usually has to seed the same message to each station (STA) of a specific group, and the multicasting is one of the most efficient communication ways. To assure the validity of the entity and the privacy of the message, we should first solve the problem of the multicast key secure distribution...
With the rapid development of the increasing urban traffic demand, the road traffic congestion problems become serious matter. Traffic congestion not only increases the time of travel delay, but also wastes a lot of money. This paper introduces an urban traffic congestion dynamic predict method based on advanced fuzzy cluserting model. Moreover, the paper puts forward the warning measures based on...
To solve the problem of cheating in the reconstructing process of visual cryptography, a verifiable visual cryptography was proposed by adding a verifier to common visual cryptography scheme (VCS). This scheme can be used in any access structure and can check every share to prevent attackers from spoiling and grabbing the secret information.
Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one. A certificateless aggregate signature scheme that is provably secure in our model is also presented. The security of our...
The verifiably encrypted signature schemes proposed by Asokan solved the fairness problem in the fair exchange process. In the work, we propose an ID-based strong unforgeability verifiably encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the computational Diffie-Hellman problem. Our scheme is obtained from a modification...
The first digital signature scheme with a (t, l) threshold subliminal channel was proposed by Lee et al. However, according to our analysis, it is found that Lee et al.??s scheme is low efficient in practice. At the same time, Lee et al.??s scheme is not secure against resending attack. Then, a randomized RSA signature scheme is proposed. The proposed randomized RSA signature scheme can be proved...
Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant??s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme...
The concept of concurrent signatures was introduced by Chen et al. in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from any third party??s point of view until the release of a secret, known as the keystone. Once the keystone is released, both signatures become binding to their respective signers concurrently. In the...
Template security is crucial since biometrics don't change, and privacy concerns cause users to be fearful of intrusions by government and other organizations. This paper proposes an approach to address these two concerns. "Chaff Points'' are added to the MFCC feature matrix such that it is difficult for an adversary to separate the genuine points from the mixture. A prime accumulator is designed...
Aimed at those access control system which support role hierarchy and static mutual exclusion roles (SMER), an intelligent method from intelligent planning, named Graphplan, was imported to perform the security analysis. A complete resolution for reachability problems was designed and presented, including a description model using planning language,the key conception virtual action which was put forward...
Research of the security model is one of security system keys. The secrecy and the integrity are two important demands of security system. BLP model mainly satisfies the secret request , and Biba model emphasises the integrity request. The few security models unify the secrecy with the integrity. A mutilevel database security model increases integrity examination in the foundation of original secret...
A federated security scheme based on WS-Security standard for cross-domain grid is proposed. It integrates the WS-Security standard and the grid security mechanism. A trust model is established based on WS-Trust specification. A communication is established based on WS-SecureConversation specification. The architecture is implemented in a SAML-based federated authentication and authorization cross-domain...
In order to assess the security of network information system, many graph-based approaches have been proposed. Attack Graph is the most influential one. But attack graphs grow exponentially with the size of the network. In this paper, we propose an improved access graph based model to analyze network security. As a complement to the attack graph approach, the access graph is host-centric approach,...
Secure routing is the key to assure wireless sensor networks working in order, and the classical security mechanisms, such as encryption and authentication can only prevent the outside attacks. In order to defeat the attacks of the inside malicious or captured nodes, in this paper, the trust technology and node??s location information are employed in the process of routing. At the same time, for prolonging...
With the widespread application of large and complicated network, network safety has become an important issue. In this paper, a security operation center (SOC) concept based on multi-sensor data fusion technology is presented from the viewpoint of the network security. A structure of a SOC system based on radial basis function neural (RBFN) network is proposed, and the detailed method of data fusion...
As grid??s dynamic, distributed and open nature, the issue of mutual trust among grid entities is challenging, not only because of the entities in different domains, but also because the fact that those domains may deploy different security mechanisms. A federal authentication and authorization scheme based upon trust management and delegation is proposed. Different security domains can join in the...
IMSI (International Mobile Station Identity) is a unique number associated with all GSM and UMTS network mobile phone user. IMSI filtering - a prefix filtering, is an important function in the 3G firewall. It is an indefinite filtering which affects the efficiency of the security device. This paper brings forward a parallel processing method which uses vector coding and structure of bloom filter....
In the last couple of years, identity based cryptography has got fruitful achievements. Proxy blind signature scheme enables a proxy signer to make blind signature on behalf of the original signer. This paper proposes an ID-based proxy blind signature scheme based on the bilinear pairings. We also analyses the scheme??s correctness efficiency and blindness property.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.