The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we point out the deficiencies of the existing DAA schemes on member revocation, inter-domain attestation and Rudolph's attack prevention and present a new scheme called Enhanced Privacy Inter-domain Anonymity Attestation based on Peer-to-Peer Networks. We add a new party called Trusted Auditor (TA) and construct a TA level above the existing DAA scheme. Analysis shows that the proposed...
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical...
Recently, Huang and Cao proposed a novel and efficient unlinkable secret handshakes scheme with several security features including the affiliation-hiding property and the AKE-security. In this paper, we examine the security of the Huang-Cao scheme and show that the scheme fails to achieve two fundamental security requirements, the affiliation-hiding property and the AKE-security.
Secure multi-party computation (SMC) is dedicated to solve trust problems in cooperative computing with each participantpsilas private data. Privacy preserving computational geometry (PPCG) is a special area in SMC and is being widely used. This paper investigates the problem of judging whether a point is in a convex hull or not. We firstly present a secure protocol to determine the position of a...
The E-cash schemes that are revocable anonymous with the help of trusted third party (TTP) cause additional costs and the level of anonymity is uncertain. Kulger et al adopted auditable tracing to control deanonymization without TTP, but the users have to audit the tracing frequently. A loss reportable e-cash scheme without TTP based on ECC is presented in this paper. In our scheme bank demands user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.