The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Push notification services provide reliable, energy efficient, store-and-forward messaging between servers and clients. This mode of communication is widely used, and sufficiently compelling for mobile devices that push notification services are integrated into operating systems. Unfortunately, push notification services today allow the service provider to practice censorship, surveillance, and location...
Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit its widespread deployment. Security in passive RFID tag based systems is a challenge owing to the severe resource restrictions. In this paper, we present a lightweight anonymity...
While Web browsers are fundamental components in the Internet nowadays, the widespread availability of several techniques that can be used to detect the individual browser connected to a server raises privacy issues that need to be adequately addressed. Browser fingerprinting uses a combination of attributes, whose values are silently obtained during normal navigation, to identify, with high likelihood,...
Positioning capabilities offered in modern mobile devices enable usage of location-based services. Privacy and security is of great importance for related applications. We present a framework that allows conducting research on anonymity techniques in a real-life environment using smartphones. The proposed solution also includes logging mechanisms that facilitate positioning research dataset development...
With the rapid deployment of M2M services, countless smart “things” with sensing and communication capabilities are collecting data about the physical world we live in. These data can be used by various service providers to make their services more customized with high quality. On the other hand the availability of personal information raises serious concerns over individual privacy. In order to prevent...
Mobile Ad hoc Networks (MANETs) have become increasingly popular with the rapid emergence of hand-held devices and advanced communication technologies. As a result, several MANET applications have been proposed one of which is the data access application. To enhance the performance of this application cache management systems have been suggested; however, they have been designed regardless of the...
Online social networks (OSN) have now become one of the most widely used Internet applications with a huge base of online users. In an OSN, the users exchange their personal information via messages, pictures and videos with their online peers/friends for their personal or business interests. Since the information that flows across an OSN is generally of personal in nature, it is important that the...
In computer networks, how a server authenticates a client with a smart card to negotiate a session key for establishing a secure connection becomes an attractive research topic. For client authentication and key agreement, in 2011, Wang et al. proposed an authentication and key agreement scheme. They claimed that the proposed scheme possessed the following properties: no verification table, free password...
Social sites frequently ask for rich sets of user identity properties before granting access. Users are given the freedom to fail to respond to some of these requests, or can choose to submit fake identity properties, so as to reduce the risk of identification, surveillance or observation of any kind. However, this freedom has led to serious security and privacy incidents, due to the role users' identities...
In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the other hand, it may also be required to have a backdoor in pseudonym systems for identity revealing that can be used by law enforcement agencies for legal reasons. Such pseudonym providing...
We use authentication services many times a day. Without user authentication, it would be impossible to use email accounts, discussion boards, e-banking or even electronic communication. On the other hand, we release a lot of personal information during every authentication process. Our login can be linked to used services and assets by service providers. The frequency of usage and therefore the map...
Recently, many smart card-based anonymous authentication schemes have been proposed to preserve user's anonymity. Unfortunately, most of these schemes do not achieve to preserve user's anonymity from the malicious user. In 2008, Kim et al. proposed a scheme which not only guaranteed user privacy but also provided traceable anonymity authentication. In this paper, we first point out that Kim et al...
Electronic voting is one of important applications in security protocols. Now most of existing voting schemes are mainly for election in which each voter has only one ballot. However, there are cases in which each voter has multi ballots. In this paper we present a new voting scheme in which each voter has multiple ballots and votes for multiple candidates. In this scheme the voter simply picks up...
Since the number of server providing the facilities for users is usually more than one, remote user authentication schemes used for multi-server architectures, rather than single server circumstance, is considered. In 2007, Liao and Wang proposed a “secure dynamic ID based remote user authentication scheme for multi-server environment” that uses dynamic ID instead of static ID to achieve user's anonymity...
Group key agreement (GKA) protocols are used to secure group communications in wireless networks but most current GKA protocols do not consider privacy protection. GKA protocols for wireless networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively, that is, the Join Protocol must ensure...
Citizen Cards are being deployed nowadays. Several applications are being developed using such cards. Different kind of services can be provided with such cards, from services demanded by the administration, to applications from private companies. Unfortunately there is a great amount of applications that are not able nowadays to use the security these cards offer, due to their requirement of keeping...
Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper distinguishes event scheduling from electronic voting and proposes a privacy-enhanced event scheduling scheme. Based on superposed sending and Diffie-Hellman key agreement, it is designed to be efficient enough for practical implementations...
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.