The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is increasingly clear that existing phone security mechanisms are inadequate and that change is necessary. Instead of protecting phone conversations from eavesdropping, the UK government's proposed voice encryption standard appears to be designed to facilitate undetectable mass surveillance.
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
Automated Trust Negotiation aims to securely identify the consensus between two sets of policies consisting of certificates, with minimal disclosure of policies to each other. The paper proposes a new scheme that allows both parties to learn whether or not, both parties agree to transfer a given target certificate to the requesting party. No policy is revealed after performance of the protocol. No...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to exchange their social data easily by using their phones and PDAs. We show that existing solutions put the users at security and privacy risks. Then, we describe our protocol for exchanging users' social data. We demonstrate that enables better security and privacy for exchanging social data. In addition...
As the Internet becomes more important, the claims on it increase. Those claims cannot all be met. Now is the time for choosing. The Internet was built by academics, researchers, and hackers-meaning that it embodies the liberal cum libertarian cultural interpretation of "American values," namely that it is open, nonhierarchial, self-organizing, and leaves essentially no opportunities for...
In this paper, to simultaneously protect the receiver-location privacy and improve the performance of packet delivery in VANET, we utilize ``Sacrificing the Plum Tree for the Peach Tree" - one of the Thirty-Six Strategies of Ancient China, to propose a socialspot-based packet forwarding (SPF) protocol, where each vehicle receiver only reveals a non-sensitive socialspot, e.g., a shopping mall,...
WSNs are usually composed of a large number of low power sensors. They require a careful consumption of the available energy in order to prolong the lifetime of the network. From the security point of view, the overhead added to standard protocols must be as light as possible according to the required security level. To provide security and privacy to small sensor nodes is challenging, due to the...
In this paper, the problems of secure multi-party ranking and secure selection were studied. Two protocols were proposed. They were both based on Secure Sum protocol. Secure multi-party ranking problem is an extended problem from millionaires' problem. It can be applied to many fields, such as auctions, commercial enterprises and so on. Secure Sum protocol was used to calculate the sum of vectors...
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (PII) that uniquely identifies it to an SP. In the traditional application-centric Identity Management (IDM) model, each application keeps trace of identities of the entities that use it. In cloud computing, entities may...
In this paper, we point out the deficiencies of the existing DAA schemes on member revocation, inter-domain attestation and Rudolph's attack prevention and present a new scheme called Enhanced Privacy Inter-domain Anonymity Attestation based on Peer-to-Peer Networks. We add a new party called Trusted Auditor (TA) and construct a TA level above the existing DAA scheme. Analysis shows that the proposed...
This work proposes a Secure User Centric Attestation Service (SUCAS) protocol that incorporates user's action information with spatial-temporal information rendered from the location-based service to create action-spatial-temporal evidence. This evidence can be used as proof to protect the owner's right in times of need. The SUCAS protocol preserves user's privacy by granting control to the user while...
Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel location privacy enhancement protocol for VANETs. Firstly, we propose an Anonymous Online Service Access (AOSA) protocol. Secondly, we analytically evaluate the anonymity and the unlinkability...
Distributed denial of service (DDoS) attacks still remains as one of the largest concerns for online businesses. Although an HTTPS compatible scheme is necessary for many online services, several previously proposed defense schemes fail to combine both HTTPS compatibility with practicality. In this paper, a novel defense architecture that blocks malicious traffic far from the protected servers is...
Introduced the credible computation's background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original...
Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource sharing between mobile clients/users that are socially interconnected. However, the functionality and security of such networks would be potentially undermined without an effective trust management...
In this paper, we investigate the security of a recently proposed RFID authentication protocol that needs O(1) time complexity to find out the identifier of the RFID tag irrespective of the total number of the tags. We exhibit a flaw which has gone unnoticed in design of the protocol and show that it makes the scheme vulnerable to tracking attack, tag impersonation attack and denial of service attack,...
Record linkage from multiple, independent and heterogeneous databases is a major area of database research. However, little attention has been paid to the privacy concerns of colluding databases. Activities such as sharing data for scientific research, monitoring disease symptoms over a region or developing large e-commerce market place, all require large scale data integration among different organizations...
With the extensive application of RFID technology, people pay more and more attention to its security and privacy issues. Currently, security issues have become major factors which impede the large-scale applications of RFID technology. In this paper, security issues existing in RFID system are analyzed and the main authentication mechanisms proposed at home and abroad are analyzed and compared, and...
Nowadays, Electronic Payment Systems are inseparable part of digitally communication systems. One of the crucial challenges of Electronic Payment System makers is making security and anonymity. Digital information while transferring through the network or in storage systems and servers can easily be copied. Moreover, electronic money which is a good simulation of cash money should have the most characteristic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.