The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: computational intelligence; fuzzy and intelligent systems; data mining; support vector machines and learning algorithms; pattern recognition; access control and block/stream ciphers; cryptosystems and cryptanalysis; security management; network and wireless security; and security models.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN)...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
There are many researches which focus on the security of network-attached storages. The cryptology tools can protect the storages against non-authorized access, but turned out ineffective when malicious authenticated users attack inside. Also the intrusion detection methods are applied in the network-attached storages, such as, storage-based intrusion detection method and the intrusion detection method...
This paper proposes a secure mobile multicast hand-off mechanism supporting a group-key management and membership authentication for a mobile multicast member. Our group-key management creates a time-limited group key for the moved member for efficient update of a multicast group-key. Also, an old MMA (mobile multicast agent) performs the member re-authentication with a new MMA during movement from...
In this paper, a new biometric authentication scheme based on fingerprint is proposed. To the best knowledge of us, this is the first biometric authentication scheme which is combined with fuzzy extractor and smart card. Futhermore, this scheme has improved the security flaws of previous schemes and can be suitable to the use of ATM, e-bank, and e-commerce etc. due to its convenience and simplicity...
In the advanced Internet age, researchers dream for a solution to truly enable cash to be available on the Internet with all facilities that we have it in normal usage. Last few years have seen many protocols and suggestion; but all have failed to provide anonymity and security together. This paper illustrates a new protocol for anonymous and secure e-commerce system for e-cash transaction. This paper...
Multicast applications in imbalanced environment require the equal computation for each mobile node. An ECC-based hierarchical key agreement scheme, ECC-GDH, is proposed in this paper. The scheme divides the responsibility of computation into each member so as to achieve the equality demand. Moreover, the scheme also achieves forward and backward secrecy. Finally, we obtain an access control model...
This paper analyzes the security of content-based watermarking authentication framework in the extraction of the feature watermark and the watermark embedding using information theory. Security analysis of feature watermark is composed of four parts, that is, the extracted feature is as watermark, the encrypted feature after extracted is as watermark, the encrypted feature before extracted is as watermark...
Authentication is one of the most important properties in network security, it is usually ensured by designing authentication protocols which use cryptographic techniques. Unfortunately, practice proved that the analysis and design of a protocol is not easy even it is very simple. The paper describes an automatic generation of authentication security protocols based on the evolutionary algorithm and...
With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet distribution...
This paper considers the privacy issues in attribute-based access control systems, and presents a privacy-preserving access control protocol named as symmetrically oblivious envelope protocol. Its important property is symmetric privacy, i.e., the resource owner can't learn attribute values of the resource requester, and the resource requester can't learn access control policies established by resource...
Sensitive information, e.g., privacy information or company secret, should be carefully managed and it is desired that only privileged users can read and edit these kinds of information. For these needs, this paper proposes cryptographic schemes for a proper use of digital document and a concrete construction for the proposed schemes. Note that the proposed schemes are called ldquocontent protection...
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual...
Biometric techniques are gaining importance for personal authentication and identification. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore providing security to the stored biometric template is very crucial. Crypto biometric systems are...
Universal plug and play, or UPnP in short, is a ldquoplug and playrdquo methodology used in network environment. It's designed to share resources, connect network devices and offer control over services. It implements zero-configuration. Developer can save the cost of network setup and concentrate on the offering services only and do not need to concern the under layer protocol. As the wide spreading...
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access...
Recent advances in distributed in-network data storage and access control have led to active research in efficient and robust data management in wireless sensor networks (WSNs). Although numerous schemes have been proposed this far, most of them do not provide enough attention towards exploiting user hierarchy and sensor heterogeneity, which is quite a practical issue especially when deploying WSNs...
Facing the rapid development of multimedia and Internet technology, the demand of information on the real-time communications and confidentiality is increasing highly. The system, mainly based on a chaotic encryption algorithm and combined with multi-level shuffle exchange network, is designed and implemented a high-speed data encryption system. After settling the problem of conflict of access caused...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.