The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems...
Elliptic curve cryptosystem has been heavily studied by computer scientists for many decades. This form of cryptosystem is based on elliptic curves over some Galois fields. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem that makes use of public and private key pairs as a means of encrypting and decrypting information in the internet. The critical security of ECC relies...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Due to their high efficiency and their strong security properties, lattice-based cryptographic schemes seem to be a very promising post-quantum replacement for currently used public key cryptography. The security of lattice-based schemes has been deeply analyzed mathematically, whereas little effort has been spent on the analysis against implementation attacks. In this paper, we start with the fault...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing...
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design. MANETs and WSN are the most common forms of Wireless media. In MANETs nodes are deployed or distributed in Ad-hoc way and they are communicating or exchange message using wireless Transmission...
We investigate the linear complexity and the minimal polynomial over the finite fields of sequences constructed on the basis of cubic residue classes. In particular, we find the linear complexity and the minimal polynomial of the characteristic sequence of cubic residue class and balanced cyclotomic sequences of order three.
Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents...
Blockchain represents a technology for establishing a shared, immutable version of the truth between a network of participants that do not trust one another, and therefore has the potential to disrupt any financial or other industries that rely on third-parties to establish trust. In order to better understand the current ecosystem of Blockchain applications, a scalable proof-of-concept pipeline for...
Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems...
With the rapid development of the Internet and mobile platform technology, the network application based on P2P/P2SP is increasing, which makes the network bandwidth resources become increasingly tight. Based on the protocol analysis, this paper studies the characteristics of the typical P2P/P2SP packet, and proposes the specific recognition scheme for the application of this kind of application,...
Due to the rapid growth of information acquisition in the era of the Internet of Things (IoT) and Cloud Computing, the concern about the security of private information raises a lot of interests. This paper investigates image sharing based on the concept of (k, n)-threshold strategy according to the Chinese remainder theorem (CRT). A secret image is distributed into n noise-like shadow images preserved...
Information disguising is one of means to insure information transmission security. In order to obtain a way to disguise information, this paper researches a disguising way that is transmitting false information to realize information security. The paper proposes F-disguise carrier information and F-disguise surplus information by using P-sets. By combining them, the paper proposes F-disguise information...
Advanced Metering Infrastructure (AMI) is an indispensable part of a Smart Grid (SG) initiative. AMI applications collect data measured by smart meters in the SG. This process may leak information about consumers. In this paper, we build an IEEE 802.11s-based SG AMI network testbed consisting of Beaglebone Black boards and investigate the performance of privacy-preserving protocols in real-life and...
This paper presents GREP, a highly scalable and efficient group rekeying protocol with the following merits. First, it rekeys the group with only two messages, introducing an overhead which is small, constant, and independent of the group size. Second, GREP considers collusion as a first-class attack. Third, GREP efficiently recovers the group from a collusion attack without recourse to a total member...
Special designs are needed for cryptographic schemes in wireless sensor networks (WSNs). This is because sensor nodes are limited in memory storage and computational power. The existing group key transfer protocols for WSNs using classical secret sharing require that a $t$ -degree interpolating polynomial be computed in order to encrypt and decrypt the secret group key. This approach is too computationally...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.