The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
P2P network is short of authentication, so the CPK (Combined Public Key) authentication mechanism and DHT (Distributed Hash Table) algorithm in P2P network are researched, and CPK authentication is used in structure P2P network for its security. At point, the series-Hash method combines both DHT algorithm of structure P2P network and peers' authentication. Then base on cluster partition P2P network,...
In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for short) of a user authentication and key agreement scheme using smart cards in different scenarios. The YLY attacks are: perfect forward secrecy, the guessing attack, and the Denning-Sacco attack. The main goal of this paper is to propose a robust remote user authentication scheme using smart card that could not only...
Due to the dynamic nature of P2P systems, it is difficult to keep a global trust of the system by analyzing all nodes’ state which will increase node load. This is why it is important to develop a trust mechanism that uses as little nodes as possible to judge the global trust. In a SuperPeer-based p2p system using the superpeers (SPs) as management nodes can allow trust mechanism to be developed that...
In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization for protocol honest agents, the intruder...
Simple Power Analysis (SPA), first introduced by Kocher et al. in [1], is a technique that involves directly interpreting power consumption measurements collected during cryptographic operations. Although the possibility of attacking elliptic curve cryptosystems (ECC) by SPA repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where...
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which combines public-key encryption (PKE) and identity based encryption (IBE) while preserving their features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status while eliminating third-party queries for the certificate status. In addition, it also solves the key escrow...
Authorization is an important means to endow the access requestors with different access rights according to their identities. In trust management and access control systems, authorization is used to ensure that legitimate users can access the required resources or accomplish the valid operations towards some resources. However, unlimited authorization transfer may lead to conflicts in access right...
Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper introduces the game-based approach of writing security proofs and its automatic technique. It advocates the automatic security proof approach based on process calculus, and presents the initial game and observational equivalences...
Recommender systems can find user interested information based on the information filtering algorithms. Collaborative filtering technique has been proved to be one of the most successful techniques in recommender systems. And there are two approaches: one is user-based collaborative filtering and the other is item-based collaborative filtering. Data sparsity is the main problem in recommender system,...
Trusted computing has become a new and challenging research issue in the field of information security. To further enhance the safety of BIOS, we construct a trusted computing platform based on Extensible Firmware Interface (EFI), the trust chain is transferred from the first stage of EFI to the operating system by applying TPM (Trusted Platform Module) and TSS (TCG Software Stack). We presented the...
In this paper, a uniform method is presented for computing the minimum translational distance (MTD) between a pair of ellipsoids. This article deduces a necessary and sufficient condition of the witness point-pair which achieve MTD value and reliable criteria for determining their spatial relation. Experimental results show the algorithm converge after a few iteration whether two objects overlap or...
Virtual enterprise is a temporary alliance of enterprises that come together to share skills, core competencies or resources. The members in virtual enterprise need to collaborate in a distributed, dynamic, open and heterogeneous environment. Traditional Access control mechanisms, which serve the single enterprises, are not suitable for virtual enterprise. By incorporating task delegation, trust management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.