The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present an energy-efficient dynamic key management scheme in which new sensor nodes can join a sensor network securely and compromised nodes can be isolated from the network in time. Unlike in centralized and location-based key management schemes, our scheme doesn't depend on such infrastructure as base stations and robots, thus it possesses a high level of flexibility. By using...
We present a robust threshold signature scheme which is provably secure without random oracles under the computational Diffie-Hellman assumption. Our construction derives from a novel application of the recent signature scheme due to Waters. Compared with Wang et al.'s threshold signature scheme without random oracles, the signing procedure of our scheme is much more efficient in terms of communication...
This paper presents an approach to a user authentication system for web applications using JME enabled cellular phone as an authentication token. Most of the existing web based user authentication systems use user IDs and passwords to authenticate users. However, since its inception, the internet has been the witness to increasing number of attacks resulting sensitive information like user IDs, passwords...
To overcome the secure weakness of the existing proxy blind signature scheme based on ECDLP, an improved scheme is presented. The security of the improved scheme is enhanced by improving on the generate form of the proxy commission and the proxy private key in the proxy phase, the procedure of blinding and unblinding, and the corresponding verification equation of proxy blind signature. The analysis...
This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact...
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware based pattern matching. Additionally, evolutionary rule...
Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to deploy new signatures without...
In this paper we suggest a protocol for secure data distribution in a one-way communication scenario aimed at time distribution for sensor networks. Our protocol is designed to support timestamps in any format, including repeating, resettable, and incomplete timestamps. The protocol requires a trusted powerful source node. We show that the protocol is immune to attacks including replay attacks, wormhole...
This paper presents a service that provides security through the technology of Web services. The use of web services to provide security in e-learning systems will complement the features of services developed in language and/or different architectures. Thus, our work is not limited to platforms in which the client (e-learning system) was developed, since this service is provided on a flexible, scalable...
A verifiable committed signature is constructed based on Fischlin's signature scheme and is proved of its security in the standard complexity model. And then, an optimistic fair exchange protocol with punishment function is designed based on the committed signature. It will punish the misbehavior of either party in order to ensure the fairness of the exchange. Through the analysis, not only are some...
The SIP authentication mechanism implemented in most applications is the HTTP Digest Authentication. This mechanism is easy to implement and delivers high performance results. But the weaknesses of this authentication method are not acceptable where security is of high concern. The ID based authentication mechanisms do not suffer from the vulnerabilities of secret based authentication schemes. Also...
Delivering messages anonymously in ad hoc network is very important because of the special characteristics. Meantime, a trusted third party can trace the message sender by using some secret keys in case of dispute. Recently, a multi-PKG ID-based signcryption scheme for ad hoc networks is proposed, which is semantic security and existential unforgeability in random oracle model. But it is not anonymous...
After studying blind proxy signature scheme and a group of digital signature schemes based on two hard mathematical problems, a new blind proxy signature scheme based on both elliptic curve discrete logarithm problem and integer factoring problem is proposed and its security is analyzed. The analysis results show that the scheme satisfies all necessary security properties of the proxy signature schemes...
A digital certificate scheme in content protection system for high definition digital interfaces is proposed. Before transferring the encryption content, the device interface is firstly confirmed whether it is passed the certification. After the certification, then transfers the content. The interface of the receiver detects whether the recognition management unit has passed the certification. The...
The combination of the wireless sensor network (WSN) and grid computing in wireless sensor grid (WSG) architecture enables the strengths and characteristics of wireless sensor network and grid computing to be realized on a single integrated platform. This paper analyzes the necessity and key problems of combining the WSN and grid computing and shows a sensor grid architecture which is based on an...
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce security model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method...
Most proposed multi-bank e-cash protocols in the literature have been developed based on group signatures in which the member revocation problem is inevitable. In this paper, we propose a new multi-bank e-cash protocol by using blind ring signatures and linkable ring signatures, by which the client anonymity control and bank anonymity control are achieved respectively. Since our blind ring signature...
In 2002, Wu and Hsu proposed two new ID-based multisignature schemes that are suitable for the sequential and the broadcasting architectures, respectively. They claimed that these two schemes cannot be broken due to the difficulty of factorization. In this paper, we prove that the Wu-Hsu multisignature schemes can be broken by Euclidean algorithm with known signature attack.
Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user's control. However, trusted platform module (TPM) with only limited storage...
In CT-RSA 2008, Yu et al. proposed a family of three efficient Online/Offline signature schemes, which are especially suitable for the devices with limited computing capabilities. In this paper, we propose a new security model of Online/Offline signature. We find that Yu et al.' basic scheme is insecure under our model. We repair Yu et al.'s loophole by proposing a modified scheme.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.