The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key establishment has been a challenging problem in wireless sensor networks. With the increasing of the sensor network applications, many key predistribution schemes are proposed. In most key predistribution schemes, sensors are loaded with preassigned keys. Sensor nodes discover common keys to establish secure connection with neighboring nodes. Nodes that are not directly connected use intermediate...
Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain peers can be manipulated intentionally by adversaries. In this paper, we report the discovery of a novel attack, named RepHi (Reputation Hijack), against rating-based reputation systems,...
The pervasive use of wireless networks and mobile devices has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting sensitive and/or private data carried in these devices. The most challenging part lies in a dilemma: while it should be computationally infeasible for adversaries to decrypt the data, the cryptographic operation...
This paper proposes a Digital Right Management model using both cryptography and digital watermarking technology integratively. This model encrypts digital content with high-performance symmetric key, and uses robust watermarking and fragile watermarking separately to embed copyright information, license encrypted with machine fingerprint and integrity mark into the digital content sequentially according...
Remote authentication is an important security control mechanism for Web-based services. Some remote authentication schemes based on smart cards were proposed. A new smart card based remote authentication scheme was proposed in this paper to enhance the robustness to meet the scalability requirement of most Web applications.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.