The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion Detection Systems (IDS) aim to detect the actions that attempt to compromise the confidentiality, availability, and integrity of a resource by monitoring the events occurring in computer systems and/or networks. Stream data processing is a database technology applied to flows of data. Temporal Logic is a formalism for representing change over time. This paper proposes the development of...
In the last few years, a plethora of RFID authentication protocols have been proposed and several security analyses have been published creating the impression that designing such a protocol must be, more or less, a straightforward task. In this paper, we investigate the security of two recently proposed schemes, showing that designing a secure RFID authentication protocol is still a demanding process...
The growth of the Internet coupled with the complexity of the security needs increases the demands on filtering performance, so much so that it is crucial to maintain high classification throughput in a high speed environment. As a result, today's security devices require innovative designs and algorithms to optimize the efficiency of packet filtering systems. In this paper, we propose a safe and...
Network traffic classification is an essential component for network management and security systems. To address the limitations of traditional port-based and payload-based methods, recent studies have been focusing on alternative approaches. One promising direction is applying machine learning techniques to classify traffic flows based on packet and flow level statistics. In particular, previous...
In this paper, we propose a family of light-weight provably-secure authentication protocols called the RCHB family, which is a variant of the HB protocol. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. The security for the RCHB protocol family to passive attacks is enhanced by the introduction of both the rotation and complement on the secret key...
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted authority or access to any infrastructure-based network, thanks to the use of Cryptographically Generated Addresses. Moreover the solution is very convenient...
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed a security verification method for 2-party authentication and key exchange protocols based on Bellare et al.'s model and showed the verification points of the security properties to verify their security efficiently...
In a recent paper published in the proceedings of the EBISS'09 conference, Mohammad and Chi-Chun Lo claim that protocol ECKE-1N is vulnerable to key compromise impersonation (KCI) attacks and ephemeral key leakage. They also present protocol EECKE-1N, a revised version of protocol ECKE-1N, which is supposedly more secure since it does not exhibit similar vulnerabilities.
Many protocols have been proposed to guarantee the security of payments on the internet, however their adoption has failed. Meanwhile the credit card number together with the expiry date and the CVV2 has been widely adopted.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.