The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a framework for describing and analyzing security protocols. It simplifies the applied pi calculus of Abadi and Fournet by moving away the infinite processes and the capability of transmitting channels in order to make the framework fit for describing practical protocols. An alternative operational semantics is given to make the framework more efficient when analyzing protocols. The semantics...
Certificateless public key cryptography is a recently proposed attractive paradigm which combines advantages of both certificate-based and ID-based public key cryptosystems as it avoids usage of certificates and does not suffer from key escrow. Since it was firstly introduced by Al-Ryiami and Pater-son in Asiacrypt 2003, numerous certificateless encryption and signature schemes with additional properties...
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
Aspect-oriented software development method solves crosscutting problem by separating concerns and aspect-oriented software can be modeled by extending UML. This paper proposes a method to describe the aspects and core components as well as weaving between them through introducing aspect into UML statechart. Then the extended UML statechart is described in formal semantics of CSP, a kind of process...
Distributed systems have been used to solve some complicated problems. In order to make better use of resources in distributed systems, people have designed many approaches and developed many systems to manage processes in distributed systems, but most of the management systems are paid little attention on reliability of them. There may be some attacks in complex network environment. Therefore the...
We consider the problem of group key agreement among n parties communicating over an insecure ad hoc network. Firstly, we analyze the state and the problem of existing group key management schemes, and then present a secure, efficient and contributory group key management scheme, which is based on elliptic curve cryptosystems (ECC). The security of our scheme relies on the hardness of elliptic curve...
Sensor network nodes have a very tight power budget and the power efficiency is the biggest design concern in sensor network circuits. A general-purpose processor (e.g. an ARM processor) is not efficient to execute encryption algorithms because it has no special instructions to support encryption operations, for example very often-used permutation operations. In the paper, we propose a low-power ASIC...
As the technology of network has been developing, the safety of network is concerned by more and more people. The technology of information security comes about as a new field. The impact of software viruses to information security has been felt by the entire computerized world, through loss of productivity and loss of system resources or data. But the research on hardware vulnerabilities looks far...
As the core link of off-line reverse analysis, data collecting can be regarded as decryption of encrypted synchronous sequential machine, the key part of which is driving itself from decrypted state to encrypted state by building state transition diagram and using corresponding search strategy. Based on diffusion mechanism, weighted state transition diagram is built, on which single-branch search...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
Aspectual component composition platform needs a new kind of language to support the description and verification of the software architecture. Based on the extension of Wright, this paper proposes an aspectual components composition architecture description language-AWright. Since Wright fails to describe system??s non-functional requirements and lacks corresponding elements for describing the coupling...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
Along with the thorough development and application for Web services, the security of it has taken people??s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
Vehicle License Plate of GA36-2007 has overcome most defects of GA36-1992, but there are still some disadvantages on visibility, uniqueness and intelligence. At present the automatic vehicle identification system is limited on image identification technology, which still has many shortages. In this paper, we propose a new type design of vehicle license plate and develop a matched secure automatic...
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness...
A number of logics have been proposed to analyze the cryptographic protocols, but most of them cannot explicitly express time factor which plays an important role in protocols. In this paper, we present a logic to model the time in cryptographic protocols. Our logic is based on the predicate modal logic, so, the time factor can be expressed by invoking a time variable as a parameter of predicate and...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.