The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voice networks evolved from the traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling information and media...
In recent years there is an explosion in the number of applications for mobile devices. Many of these applications require the ability to issue digital signatures on behalf of their users. Traditionally, digital signatures are based on asymmetric cryptographic techniques which make them computationally expensive. Currently, all mobile devices tend to have limited computational capabilities and equally...
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such a...
Due to the rising of on-line computer and communication applications, users require an anonymous channel to transfer sensitive or confidential data on the networks. How to construct a safe communication environment to guarantee the mutual anonymity during communications becomes an important problem. Recently, researchers have focused on applying the ALR (application-level routing) framework to perform...
Domain Name System Security Extensions (DNSSEC) architecture is based on public-key cryptography. A secure DNS zone has one or more keys to sign its resource records in order to provide two security services: data integrity and authentication. These services allow to protect DNS transactions and permit the detection of attacks on DNS. The DNSSEC validation process is based on the establishment...
IPSec is a security protocol suite that provides encryption and authentication for IP messages at the network layer of the Internet. ESP Protocol that is one of the two major protocols of IPSec offers encryption as well as optional authentication and integrity of IP Payloads. IV attacks are a security risk of the CBC encryption mode of block ciphers that can be applied to IPSec. We propose methods...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.