The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Portable Document Format (PDF) is used for representing two-dimensional documents independent of the application software and hardware. PDF is now a published ISO standard. This article presents the idea of implementing a plug-in for PDF based on Digital Rights Management (DRM) technology. In this system, the issuer can encrypt the PDF files with its issue license awarded by authentication server...
After the worldpsilas largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made...
In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communications channel, all approaches consider the overlay network as a single entity and none of them take into account peer group based environments. In this paper, we describe a method in order to maintain unlinkability in group membership...
Broadcast encryption is an important cryptographical technique. It allows a center to deliver the encrypted data to a large set of users so that only a particular subset of privileged users can decrypt it. Most of previous broadcast encryption schemes only provide confidentiality, while they cannot provide authentication and non-repudiation. Recently,Li et.al proposed a broadcast signcryption scheme...
A security-oriented program transformation maps programs to security-augmented programs, i.e. it introduces a protection mechanism to make programs more secure. Our previous work defined security-oriented program transformations [6], introduced a catalog of transformations [8], and showed how program transformations could be applied to systematically eradicate various types of data injection attacks...
In 2004, Das et al. proposed a ldquoDynamic ID-based Remote User Authentication Scheme using Smart Cardsrdquo. This scheme have the advantage that users can choose and change their password freely and the server does not maintain any verifier table, which avoid the risk of stolen/modifying this table. However, in 2005, Liao et al. demonstrated that Das et al.'s scheme suffers from guessing attacks,...
Message authentication is a critical task in wireless sensor applications not only because it is a basic building block to ensure the authenticity of information but also a prerequisite for bootstrapping cryptographic secrets. Authentication has been explored extensively in the literature, however, the insecure environment within a fabric where multiple users and applications coexist, and limitations...
Biometrics play an important role in modern access control systems to overcome the problems of forgotten, stolen or easily-guessed passwords. With the recent developments in cryptography, hashing and random number generation, biometrics and cryptography are combined in new generation cryptosystems. In this paper, it is aimed to produce a unique binary biometric identity code (bit string) by using...
In this paper a new message encryption scheme using a concept called cheating text is proposed. The original message is embedded in a meaningful text called cheating text. The positions of the characters of the plain text in the cheating text are stored as real message index file (RIF). This file is encrypted and sent along with the cheating text. The receiver, in turn, decrypts the RIF table and...
In order to solve the problem that BLP model directly canpsilat be applied to application systems, an application system-oriented mandatory access control (ASOMAC) model extended from BLP is proposed. Combining with role and security label , this model achieves the principle of least privilege and separation of duty, and not only improve effectively the agility of mandatory access control, but also...
In modern grids, authentication is usually implemented via an X.509 PKI. Proxy certificates are employed to facilitate interaction with the grid, especially for purposes of delegation and single sign-on. However, due to the nature of proxy credentials, these can be obtained by an unauthorized third party and abused for disruptive actions or unauthorized resource consumption. We propose modifications...
In order to secure RFID transactions, an authentication scheme has originally been included as part of the "EPC Gen2" industrial standard. This scheme, however, has been found to have some weaknesses. To overcome such weaknesses, some authors have proposed new schemes to improve its security. Two of the latest proposals are the Lim-Li protocol and the Konidala-Kim-Kim protocol presented...
A federated identity management system extends identity information across multiple security domains. It is an enabler for sharing information and services among organizations while respecting the authorization decisions of each organization. Federation can be realized in two ways: (1) Conventional federation that is based on a multilateral agreement among participants and (2) peer-to-peer (P2P) federation...
As the internet has been widely spread, it becomes big issues that an excessive demand of unnecessary private information at Web servers and invasion of privacy. Anonymous authentication technology is a solution of this problem. It can protect the personal information and guarantees the convenience which an Internet gives in our life. Anonymous authentication is an authentication method based on a...
In this paper, we improve a decentralized management method for uniquely accessible attribute information. The previous method has the problem of the inconsistency in access policy. In our new method,the user has always to redirect from the identity provider to the attribute provider, because the user cannot make requests directly to the attribute provider. Our method makes it possible for the identity...
Textual-based password authentication scheme tend to more vulnerable to attacks such as shoulder-surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based scheme. Because simply adopting graphical password authentication also has some drawbacks, some hybrid schemes based...
In IEEE ISI 2008, an anonymous attribute authentication scheme has been proposed using a self-blindable certificate scheme. This scheme enables the anonymity and certificate revocation. A Certificate Revocation List (CRL) is used in the revocation check. Even if an attacker can obtain a CRL, the attacker cannot execute the revocation check. This means that this scheme enables the designated revocation...
The IP Multimedia Subsystem (IMS) is regarded as one of the most prominent enablers for successful service provisioning across different access network technologies and devices. While new paradigms, e.g. seamless communication, enter the IMS, existing solutions, e.g. for authentication, need to be re-defined, which is one of the major activities within the EUREKA!-funded Mobicome project, involving...
In 2002, Lee et al. proposed a scheme improving on Peyravian and Zunic scheme. However, Yoon et al. found that the scheme is vulnerable to a denial of service (DoS) attack and proposed a enhanced scheme on Lee et al.'s scheme. Unfortunately, Ku et al. pointed out that Yoon et al.'s scheme can not achieve backward secrecy and is vulnerable to off-line password guessing and stolen-verifier attacks....
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.