The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
A number of logics have been proposed to analyze the cryptographic protocols, but most of them cannot explicitly express time factor which plays an important role in protocols. In this paper, we present a logic to model the time in cryptographic protocols. Our logic is based on the predicate modal logic, so, the time factor can be expressed by invoking a time variable as a parameter of predicate and...
P2P together with media streaming technology brings a new method for video service. This paper proposes a design to deploy video service on commercial systems with authentication servers. The design combines C/S charging model, and provides video contents in a P2P way. According to the address information registered on authentication servers, a media management server helps new peers to find their...
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
Aspectual component composition platform needs a new kind of language to support the description and verification of the software architecture. Based on the extension of Wright, this paper proposes an aspectual components composition architecture description language-AWright. Since Wright fails to describe system??s non-functional requirements and lacks corresponding elements for describing the coupling...
Component-based software architecture realizes non-functional attributes through specific middleware platform, thus mapping components to component models will results in code which the crosscutting concerns encapsulated in the middleware showing up at several models, which increases the dependencies among component models, and reduces the ability of architecture to describe system. In view of this,...
Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. It uses some parameterized transforms to convert an original biometric template into a new version for authentication. The security of cancelable biometrics lies on noninvertibility of the transformed template, that is, the transforms should be noninvertible so that the original template...
Distributed systems have been used to solve some complicated problems. In order to make better use of resources in distributed systems, people have designed many approaches and developed many systems to manage processes in distributed systems, but most of the management systems are paid little attention on reliability of them. There may be some attacks in complex network environment. Therefore the...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.