The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
We study randomized fingerprinting codes that achieve the fundamental capacity limits subject to the so-called Boneh-Shaw marking assumption. Two decoding schemes are studied in particular: the joint decoder is capacity-achieving but computationally intense, while the simple decoder is suboptimal but efficient. We provide tight bounds as well as numerical results for capacities and study the difference...
Network security requirements have recently gained widespread attention in the requirements engineering community. Despite this, it is not yet clear how to systematically validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity...
In this paper we analyze a class of n-person supermodular games that arise in the context of interdependent security analysis. More specifically, we quantify the number and the distribution of Nash equilibria in pure strategies and their impact on the tipping set.
Individuals in computer networks not only have to invest to secure their private resources from potential attackers, but have to be aware of the existing interdependencies that exist with other network participants. Indeed, a user's security is frequently negatively impacted by protection failures of even just one other individual, the weakest link. In this paper, we are interested in the impact of...
Physical layer security is an emerging security concept that achieves perfect secrecy data transmission between the intended network nodes, while the eavesdropping malicious nodes obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdropping malicious nodes while the interference to the intended destination is...
In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n)-threshold agreement certificates of a secret are also shadows derived from the original secret using a different access structure. Based on these certificates, we present a (t, n)-threshold secret sharing scheme which can resist participantspsila cheating. That is, any participantpsilas cheating would not work...
Signcryption is a public key cryptographic primitive that combines the functionalities of encryption and digital signatures in a single logical step at low computational and communications costs. This paper presents a new efficient multi-recipient identity-based signcryption scheme. The scheme provides public verifiability of ciphertext origin which is an essential requirement in firewall authentication...
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in identity-based setting. This question seems to have never...
Recently, cryptographic schemes based on the user's attributes have been proposed. An attribute-based group signature (ABGS) scheme is a kind of group signature schemes, where a user with a set of attributes can prove anonymously whether she has these attributes or not. An access tree is applied to express the relationships among some attributes. However, previous schemes do not provide the changing...
An ideal system should be usable and secure. However, increasing the security of a system often makes its use more cumbersome and less efficient. This tradeoff between usability and security poses major challenges for system designers. System security may be impaired when users override or ignore security features to facilitate the use of the system. Little empirical data are available on user behavior...
A game theoretic recommendation system is presented that aims to improve security alert dissemination and evaluation. The system increases the efficiency of its users (e.g. system administrators), who operate under time and resource limitations, by improving the information flow from security experts. Combining security alerts and local information the system recommends a resource allocation strategy...
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit...
A ring signature scheme enables a signer, in an ad hoc manner, to sign a signature on behalf of a group of users including himself such that a verifier can be convinced that one of the identified users actually generated the signature but he cannot identify the actual signer. In this paper, we propose a highly efficient ID-based ring signature from pairings that requires only one pairing operation,...
There are significant interactions between video game stakeholder emotional requirements and security requirements. Counter-intuitively, some traditional security requirements are not necessarily met by the game implementation some forms of security breaches are condoned by the stakeholders (if not actually demanded by them) and the requirements engineering process must support these contradictions...
A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at...
In various computer security settings, such as when customers use the same passwords at several independent Web sites, security decisions made by one organization may have significant impact on the security of another. We develop a model for security decision-making in inter-dependent organizations described by a linear influence network. In this model, a matrix represents how one organization's investments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.