The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
An attribute-based signature (ABS) scheme is a signature scheme where each signer gets the set of attributes from an attribute issuing authority and signs a message with some signing predicate which is satisfied by his/her attributes. A receiver of the signature verifies that the signature is in fact sent by someone whose attributes satisfy the signing predicate, without getting any knowledge about...
In this paper, we have improved the existing estimates of the minimum number of group operations required to solve Diffie-Hellman problem for important elliptic curves used in practice. This leads us towards the equivalence of Diffie-Hellman problem and the discrete logarithm problem for those important elliptic curves.
Annihilator immunity is important property as optimum value of Algebraic Immunity is required to resist fast algebraic attack, but to resist other attacks, optimum value of other properties is also required. Optimal value of Correlation immunity is required to resist correlation attack. Similarly, optimal value of nonlinearity, autocorrelation etc. is required to get good Boolean function. So, our...
Grayscale and color images enlarge the area of visual secret sharing scheme. Conventional (2, n) random grid visual secret sharing (RG-VSS) scheme encrypts the secret image into n noise-like share images, called as shares. This scheme generates n shares with equal priorities; thus, decrypts the secret image by stacking any two shares. Recently, concept of two-tier (2, m, n) lock and key share RG-VSS...
The NTRU public key cryptosystem was proposed by Hoffstein, Pipher and Silverman in 1996. NTRU is one of the most widely used public key cryptosystems and its security has been an active research topic. In 1977, coppersmith and Shamir applied new lattice basis reduction techniques to cryptanalyze the scheme, to discover either the original secret key, or an alternative secret key which is equally...
People are highly dependent on online social networks (OSNs) which have attracted the interest of cyber criminals for carrying out a number of malicious activities. An entire industry of black-market services has emerged which offers fake accounts based services for sale. We, therefore, in our work, focus on detecting fake accounts on a very popular (and difficult for data collection) online social...
Currently, the Internet faces serious threat from malwares, and its propagation may cause great havoc on computers and network security solutions. Several existing anti-malware defensive solutions detect known malware accurately. However, they fail to recognize unseen malware, since most of them rely on signature-based techniques, which are easily evadable using obfuscation or polymorphism technique...
Many data management applications, such as setting up Web portals, managing enterprise data, managing community data, and sharing scientific data, require integrating data from multiple sources. Each of these sources provides a set of values and different sources can often provide conflicting values. To discover the true values, data integration systems should resolve conflicts. In this paper, we...
The Cloud Computing (CC) is an Internet-based technology which offers a shared pool of highly available, virtualized, dynamically scalable, and configurable computing resources (e.g., networks, servers, computing power, storage, applications, data, services, etc.). In the CC, the authentication as well as trust and reputation of the cloud users and service provider is a critical issue for the security...
Cloud computing is a shift towards increasing the capabilities dynamically without investing in new infrastructure. Enormous storage of data and high-speed computing to customers over the internet can be accomplished using cloud. Security of data in cloud is one of the chief concerns which acts as an obstacle in the realization of cloud computing. Along with quick expansion and application of cloud...
This paper proposes two classes of new pseudorandom number generators from block ciphers, called HTR and HBC. They are provably secure in the PRG-CIA (pseudorandom generator against chosen-input-attacks) sense, assuming that the underlying block cipher is a secure pseudorandom permutation (PRP). HTR is a parallel structure, while HBC is a cascade structure. Therefore, the implementation efficiency...
Bitcoin is a digital currency based on cryptographic algorithms. All the transactions of this currency are recorded and stored in a publically available database called blockchain. Since, these transactions are available to everyone, bitcoins must be stored in a secured wallet. These bitcoin wallets can be opened only by its secret key. And if once the secret key of the wallet is lost, it cannot be...
Neighborhood attack over social networking sites breach the privacy of end users having an identical scenario. Recently numbers of anonymization techniques are developed to preserve privacy against neighborhood attack by adding dummy vertices and edges. Anonymization through dummy data increases the noise level in social networks data that lead to alter the originality and increase the information...
Attribute Based Encryption (ABE) allows fine-grained access control along with data confidentiality. Anonymous Attribute Based Encryption (AABE) supports hiding the access control policies within ciphertext so that the receiver's information remains unknown to public. Keyword-based query search over encrypted storage has become a challenging research problem when (i) the search query should not reveal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.