The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: information assurance and security; authentication and access control; cryptographic schemes and applications; data security and privacy; intrusion detection, intrusion prevention, threat modeling, and analysis; security tools design; network security; quantum cryptography.
Wireless Mesh Networks (WMNs) have revolutionized the provisioning of broadband wireless Internet service to a community of users. A group of static mesh router automatically interconnect themselves to form a Web of connection and employ multi-hop forwarding to connect to the Internet Gateway (IGW). Thus, we see that is critical to establish and ensure a collaborative framework at the MRs. All existing...
In this paper we address the problem of comparing access control models. Indeed, many access control models can be found in the literature and in order to choose one model for a particular context, some tools helping such a choice are needed. We develop here a complete example allowing to compare (in a formal way) the Bell and LaPadula (BLP) model and the role-based (RBAC) model. In order to achieve...
The threshold proxy signature scheme with strong real-time efficiency is proposed based on a trapdoor hash function and the sharing secret technology. In the scheme, the procedure of generating threshold proxy signature is performed in two phases. The off-line phase generates a threshold proxy pre-signature before the message to be signed is even known. The pre-signature is independent of the particular...
While online shopping are becoming more accepted by people in modern life, cardholders are more concerned about card fraud and the lack of cardholder authentication in the current online credit card payment. This paper proposes a purchase protocol with live cardholder authentication for online transaction which combines telephone banking and online banking together. The order information and payment...
This paper compares and contrasts authentication mechanisms used in three VO architectures: the first reflects ad-hoc connections among several organizations, the second uses a centrally managed database and the third is based on public key infrastructure (PKI). The reason for studying these particular three architectures is that they cover a large class of currently operating VOs (i.e. supply chains,...
In this paper an approach called multi-frame speaker models (MFS) is proposed, in order to cope with performance degradation generally observed over (short and medium) time and trials in speaker identification's task. The approach, based on generative models, uses multiple frame's length for speech processing in training and testing phase. A complete multi-expert system is also presented which is...
Role-based access control (RBAC) models are a powerful tool for describing and managing authorization, particularly, in large organizations. The benefits of using formal methods to describe RBAC models in a clear, consistent and rigorous manner have been recognized. Notable exemplars, that have been formulated in the formal specification notation Z, include NIST's reference RBAC model and the minimalist...
Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented through Temporal-RBAC - an extension of RBAC in the temporal domain. In this paper, we propose an initial approach towards verification of security...
Key management is deemed as the fundamental essential part of any secure communication. A secure sensor network communication protocol relies on the substantial secure, robust and efficient key management system. We put forward a new hybrid group key management scheme for hierarchical self organizing wireless sensor network architecture. By using this approach, multi-level security can be achieved...
PHAL-256 (parameterized hash algorithm) is a proposal of a new dedicated hash algorithm designed as an answer to weaknesses of MD/SHA family. Recently proposed attacks on well-known and widely used hash functions motivate a design of new hash functions. In this paper new approach is presented, where a few elements of hash function are parameterized. This approach makes the hash algorithm more secure...
Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer. This paper discusses a new application of steganography in textiles in which information is hidden in the images on the clothes...
Sending information secretly and communicating covertly have been of great interest for ages. On the other hand, text documents have been widely used and consequently various methods for hiding information in texts (text steganography) have been developed so far. In this paper a new method is proposed to hide information in digital Persian and Arabic Unicode texts.In Persian and Arabic, each letter...
In this paper, we present three related and efficient cryptographic schemes for secure communication for hierarchically composed user groups. In such a group, each user is associated with a hierarchical level, so that the group members are divided into two or more hierarchical security classes. Most existing hierarchical cryptographic schemes provide hierarchical deduction of hierarchically arranged...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.