The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In mobile ad hoc networks (MANETs), a single certificate authority (CA) node could be a security bottleneck. Multiple replica of CA is fault tolerant, but the network is as vulnerable as single CA or even worse since breaking one of the CAs means breaking all of them. Many distributed CA models based on the secret sharing scheme are proposed. In this paper, the efficiency and usability of the distributed...
Mobile core network uses signaling system no. 7 (SS7) as its signaling system. SS7 takes charge of call setup, roaming, teardown messages, database queries and so on, and becomes the important goals of the attackers or the stealers as there is a large number of userpsilas information, such as identity, location, and service, contained in signaling messages. The use of MTPsec at MTP3 layer in SS7 protocol...
In 2005, Wang et al. proposed a forward secure proxy signature scheme, they claimed that an adversary could not forge the former proxy signature even if proxy signerpsilas current secret key is lost. However, Zhang et al. pointed out that their scheme is insecure and doesnpsilat satisfy the forward security. Furthermore, Zhang et al. presented a modification scheme. Unfortunately, we find that their...
Work mode of ZigBee WSN substantially reduce the power consumption of sensor nodes and the probability of information collision. Meanwhile, network life span is extended. Because of the cyclic redundancy check and the encryption algorithmpsilas application, the security and reliability of the system are greatly improved.
Based on existing problems of security in wireless sensor networks, this paper analyzes the resistance against capture, network connectivity extending and memory overhead among random key pre-distribution schemes, q-composite pre-distribution schemes and symmetric key algorithm. A novel random key algorithm is proposed combining random and authentication. Finally, the algorithm is compared with any...
A new scheme of dynamic group blind signature based on elliptic curve discrete logarithm problem (ECDLP) which extends the dynamic group blind signature and the knowledge signature to the elliptic curve cyclic group is generalized. The scheme runs in time slice manner and can be proved security with zero knowledge proof. It supports the dynamic addition and deletion of the group members freely. And...
Recently, Xiao et al. proposed a digital signature scheme (XWS scheme) based on the conic curve over Zn and claimed that the security relied on both of the factorization and the discrete logarithm. However, there is a flaw in the XWS scheme, where the modulus n can be factorized easily. This flaw shows that the XWS scheme is not a scheme whose security based on integer factorization problem. To address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.