The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but...
In this paper a dynamic re-encrypted cipher text-policy attributed-based encryption (DRCP-ABE) scheme is introduced to keep the sharing data safe for cloud storage, which is designed to delegate the cloud service provider to re-encrypt the sharing data and send them to the authorized users, to relieve the data owner of the hard work of data management, especially in the process of authorization and...
LLRP is an interface protocol between RFID Readers and Client. Nowadays, due to the growing number of its adoption and lack of security-related research, this paper proposes an enhanced secure mechanism of Low Level Reader Protocol (LLRP) V1.1 to protect RFID systems from various attacks. This paper first makes an introduction to LLRP and the latest related research, discusses the security vulnerabilities...
Biometric identification suffers a lot of problems such as the storage of user's biometric template, the leakage of user's private and the resulting security problems. As a substitution, biometric encryption has become the focus of the present studies. Recently, numerous studies focus on biometric encryption based on Fuzzy Vault, Fuzzy Commitment and dynamic key generation. Both of them are unavailable...
As an offshoot of dynamical systems, chaos is highly sensitive to initial conditions and exhibits seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. Chaotic cryptography has experienced significant developments since its birth in the early 90's. During these years, numerous...
Although there has been much research on the leakage of sensitive data in Android applications, most of the existing research focus on how to detect the malware or ad ware that are intentionally collecting user privacy. There are not much research on analyzing the vulnerabilities of apps that may cause the leakage of privacy. In this paper, we present a vulnerability analyzing method which combines...
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does...
Personal health record which is stored safely in the cloud computing platform has captured the attention of cryptographic researchers. In order to assure the security of data, anyone can't read and tamper it without permit. In this paper, we use attribute-based encryption(ABE) scheme which is an extension of identify-based encryption(IBE) to construct a system. In this system we adopt key-policy attribute-based...
Multi-recipient encryption is an important public key cryptosystem, which can be applied for a variety of purposes, such as broadcasting data. In order to design an secure multi-recipient public key encryption (MRPKE) in post-quantum era, in this paper, we construct a novel MRPKE scheme base on Garg-Gentry-Halevi (GGH) framework which is a graded algebras analogue of multilinear maps from ideal lattice...
The traditional data publishing methods will remove the sensitive attributes and generate the abundant records to achieve the goal of privacy protection. In the big data environment, they cannot satisfy some data mining tasks with privacy considerations. This paper provides a new data publishing framework. It can preserve the data integrity, i.e., the original data structure is preserved, and it doesn't...
As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In this paper, we propose a novel patient-centric cloud-based secure PHR system, which allows patients to securely store their PHR data on the semi-trusted cloud service providers, and selectively...
Botnets have started using Information obfuscation techniques include encryption to evade detection. In order to detect encrypted botnet traffic, in this paper we see detection of encrypted botnet traffic from normal network traffic as traffic classification problem. After analyses features of encrypted botnet traffic, we propose a novel meta-level classification algorithm based on content features...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.