Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper first introduces the characteristic set of tripartite key agreement protocols. Then the relationship between the characteristic set and the security of a tripartite key agreement protocol is discussed. Because all present tripartite key agreement protocols are insecure, new protocols based on digital certification are proposed. The security and efficiency of the new protocols are discussed.
HTTPS is designed to protect a connection against eavesdropping and man-in-the-middle attacks. HTTPS is however often compromised and voided when users are to embrace invalid certificates or disregard if HTTPS is being used. The current HTTPS deployment relies on unsophisticated users to safeguard themselves by performing legitimacy judgment. We propose HTTPS Lock, a simple and immediate approach...
Fair Multi-Party Certified Mail Protocol is a value service to deliver important data over internet with guaranteed receipt for each successful delivery. Therefore, the protocol needs to be Confidential, Non-repudiation and Fairness. This paper pointed out potential security concern for a current protocol, and also came out an offline third party fair multi-party certified Mail Protocol based on signcryption...
In IEEE ISI 2008, an anonymous attribute authentication scheme has been proposed using a self-blindable certificate scheme. This scheme enables the anonymity and certificate revocation. A Certificate Revocation List (CRL) is used in the revocation check. Even if an attacker can obtain a CRL, the attacker cannot execute the revocation check. This means that this scheme enables the designated revocation...
The secret key based security scheme is proposed for achieving secure online banking. Encryption equipments are adopted at certification servers and client terminals. A secure certification protocol is established by using secret key encryption, combined secret key and smart card techniques. The one-time secret key generated automatically according to the protocol is unrepeatable. Consequently, the...
Hash chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain limits its implementations. A new kind of hash chain, called self-renewable hash chain (SRHC) is proposed, which achieves a hash chain self-renewing or re-initialization smoothly, securely throughout its usage. The renewing process of SRHC does not need additional protocols or...
In ad hoc networks, all networking functions such as routing and mobility management are performed by the nodes themselves in a self-organizing manner since they do not depend on any centralized authority. However, lack of a centralized authority and a dynamic topology change prompt many security-related challenges, specifically, in providing secure, effective and efficient key management. In this...
Key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. In 2007, Wang-Cao have proposed an escrow-free certificate-based authenticated key agreement protocol and claimed it to be secure. However, we discover that their protocol does not satisfy an important security feature that is the known session-specific...
Watermarking protocol is a combination of watermarking and fingerprinting techniques. In this paper In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing. In the proposed protocol, a memoryless Watermark Certification Authority (WCA) is introduced, that can produce many watermarks for a buyer at a time and is not required to participate in each transaction of digital...
The Internet key exchange (IKE) protocol is most widely used as a security key exchange protocol on the Internet. For example, IPSec protocol uses IKE protocol as its mandatory key exchange protocol. The various parameters of the IKE protocol must be configured in advance before establishing a connection. However, its complex options and manual settings diminish in usability. This paper proposes a...
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence...
Security in mobile ad hoc networks is difficult to achieve because of vulnerability of the links, inadequate physical protection, the dynamically changing topology and the sporadic nature of the connectivity. The dynamic change in topology results in the change of trust relationships among the nodes and as a result any security solution with a static configuration will not suffice. Authentication...
IPsec is a security architecture for Internet, which is directly positioned on the top of the IP layer. The major part of IPsec consists of the Internet Key Exchange protocol, now in its version 2. IKEv2 offers authentication, authorization and key agreement services. One of the possible authentication mechanisms in this protocol is based on X509 certificates and the PKI infrastructure. As we are...
In 2004, Hsieh and Sun showed that Fan et al.'s deniable protocol does not posse the denial property; that is, a cheating receiver can prove the source of the received message to a third party. Furthermore, they also presented a modification of Fan et al.'s protocol to overcome the security flaw. However, the current paper points out an error in Hsieh-Sun's cryptanalysis on Fan et al.'s deniable authentication...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.