The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption...
Chameleon authentication tree (CAT) is an important authenticated data structure for verifiable data streaming in 5G networks. But the typical CAT cannot support the dynamic scenario very well because it cannot expend freely since its height is fixed. Therefore, we proposed a dynamic CAT (DCAT) with the feature of adaptive expansion. We divided the algorithms of the DCAT with the following phases:...
This paper has presented an approach of vTPM (virtual Trusted Platform Module) Dynamic Trust Extension (DTE) to satisfy the requirements of frequent migrations. With DTE, vTPM is a delegation of the capability of signing attestation data from the underlying pTPM (physical TPM), with one valid time token issued by an Authentication Server (AS). DTE maintains a strong association between vTPM and its...
Prevention of spoofing attacks is a hard problem. We propose a method of preventing the MAC Address spoofing attack. Here we will use an intermediate or dummy node which lies between the server and the users. This dummy node serves 2 purposes-1). Ignore the data requests by attackers 2). Reduce the traffic on the server. The detection of attackers is done by considering physical spatial information...
Cloud computing is an information technology where user can remotely store their outsourced data so as enjoy on demand high quality application and services from configurable resources. Using information data exchange, users can be worried from the load of local data storage and protection. Thus, allowing freely available auditability for cloud data storage is more importance so that user gives change...
We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of the original Kerberos protocol, firstly, we propose the usage of the Diffie-Hellman algorithm, and put the password in the token, then take the key which has added the dynamic factor...
By analyzing the importance of single sign-on technology in the mobile application and the disadvantages of the existing single sign-on system, the application of modified single sign-on system in mobile environment is presented, and the related test and the performance evaluation had been carried on. The solution based on dynamic tokens and WMMP (Wireless M2M Protocol) implements the security and...
This paper analyses the process of Kerberos authentication protocol, and finds the existing security problems of the protocol referring to some Kerberos improvement projects proposed in some papers at home and abroad, and puts forward the thoughts and methods using dynamic password to improve the encryption security during the process of interaction between the client and Kerberos key distribution...
According to increasing the network traffic in the IMS, the role of Network Management System (NMS) is very important because of limited network resources. It can perform two kinds of routing ways with the capability of static or dynamic routing. A dynamic routing way is more efficient than static routing one because it can make the flow of traffic changeful among nodes in the IMS. Therefore, in this...
Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and...
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. This paper presents an authenticated...
E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed...
Tokens are popular in two factor authentication, where the first authentication credential is a fixed secret key s1 associated with the user and the second authentication credential is a dynamic secret key s2 generated by the token assigned to the user. Popular hardware tokens use a synchronized clock T along with a static secret key encoded into the token to generate a one time secret s2. The contribution...
To realize the real-time exchange of grid network data information, ensure the security in the process of information transmission, ensure that information will not be illegally amended, illegally wiretapped and destructed during transmission, this paper presents a secure network communications model on the basis of public-key and double identity authentication. The model not only ensured the confidentiality...
A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability of multiple proxies offers the flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that the resource consumption of maintaining state is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.