The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deniable ring authentication allows a member of an adhoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot convince any third party that message m was indeed authenticated. Most of the proposed deniable ring authentication schemes's signature size is dependent linearly on the number of ring members which causes inefficiency...
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set Computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental instructions, the MISC using Harvard Architecture enables the AES encryption in severely constraint hardware environment, with lesser execution clock cycles. The MISC architecture was...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir's No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir's...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
This paper proposes an approach to find solution to the Bounded Knapsack Problem (BKP). BKP is a generalization of 0/1 knapsack problem in which multiple instances of distinct items but a single knapsack is considered. This problem occurs in many ways in real-life, such as cryptography, finance, etc. A genetic algorithm using greedy approach is proposed to solve this problem. The experiments prove...
A novel search cheat image encryption algorithm based on hyper-chaotic Chen-system is proposed. Through mapping plain image and cheat image into hyper-chaos variables, the search and iteration algorithm is employed to encrypt plaint image to cheat image that is transferred to receiver in network. Security and performance analysis shows that this method can cheat attackers and has the same confidentiality...
Hidden identity-based signatures (abbreviated as Hidden-IBS) can be seen as a variant of the traditional notion of group signatures. Compared with group signature schemes, Hidden-IBS is more attractive in the application of identity-management systems and anonymous credential systems. In Financial Cryptography 2007, Kiayias and Zhou firstly proposed the Hidden-IBS from bilinear pairings. Unfortunately,...
Most hierarchical access control schemes are based on a trusted center, the keys of users will be fully exposed to it, which has brought potential problems for the scheme's security. This paper presents a hierarchical access control scheme based on the semi-trusted center. The user divides secret key into many shares and sends them to the semi-trusted centers separately. The centers will produce many...
The new image encryption algorithm based on Logistic chaotic map is designed. First, after two initial values of Logistic chaotic map are pretreated, two of the modified initial values are obtained based on which two chaotic sequences are generated. Next, taking the first n-gray value of the original image in turn, pixel gray value (n is odd and even) is respectively encrypted by the chaotic sequence...
At present, to access to email account or bank account, a network user has to remember the registered account number of the user and the corresponding password for every service with which they are registered. However, when multiple systems are involved, the user is then required to authenticate to each system individually and repeatedly. It results in inconvenience to each authentication. Recently,...
Digital watermarking is an important means for copyright protection. This paper presents a fragile watermarking algorithm for copyright protection based on chaotic system. The algorithm first generates a location matrix. Then it generates the mapping image and identify the embedding location of watermarking in image blocks according to the location matrix generated first. Finally it embeds the watermarking...
From the angle of improving data encryption in the information domain, put forward an arithmetic that applies the fractal geometry characteristic and spatial alternation to data encryption technology, Simultaneously uses the method that spoil the data to achieve the purpose that protect the data. Turn a ordered and significant data into several out-of-order and insignificant data, then combine the...
In this paper, two audio scrambling algorithms, which are efficient and can be used to scramble audio sequence independently, are presented first. Then, a new method which combines the two algorithms together using one more parameter is proposed. Compared with the former two methods, the new method has stronger anti-decryption capability. Experimental results show that this method has the advantage...
Rapid growth in sharing information using internet technologies laid the threats of copyright protection for digital multimedia contents. One of the remedy for intellectual property protection is Watermarking. This paper deals with numerous available digital video watermarking techniques and raised the issue of quality and size of watermarked video. Through experimental study, it has been shown that...
Powerline Related Intelligent Metering Evolution (PRIME) is a complete draft standard for a new power line communication(PLC) technology for the provision of all kinds of Smart Grid services over electricity distribution networks. To avoid eavesdropping by neighbors which connecting with the shared-medium network, 128-bit AES encryption is adopted to provide security protections in Medium Access Control...
Embedded systems have become more and more important in our lives. However almost the security protections dedicates in the PC system defense, and there is little effort in the research of the embedded systems security. Embedded systems are in danger. What is more, there are varied kinds of embedded systems platforms, which exacerbate the protection in the embedded systems. This paper is going to...
This paper aims at speeding up Batch RSA decryption. BEARSA (Batch Encrypt Assistant RSA) and BEAMRSA (Batch Encrypt Assistant Multi-Prime RSA) are proposed to improve Batch RSA decryption performance. Two variants of Batch RSA speed up decryption by reducing modules in modular exponentiation and shifting some decryption work to encryption. The experimental results and the theoretical values show...
The recent development in the field of Web services technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. There are various research initiatives made in Web services security which is an emerging trend in the field of Web services technology for the development of a large variety of enterprise applications...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.