The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, instant messaging (IM) represents the most used messaging service for both home and corporate users. IM is used in many different application fields. Thus, it is an effective and easy means of network-based communication. Unfortunately, this technology does not provide built-in support for security features. This paper proposes a new and secure instant messaging protocol for a centralized...
Kerberos is a widely-adopted network authentication protocol, which provides secure authentication service based on the reliable third-party. By exploiting a shared key, Kerberos ensures the confidentiality and integrity for a session. Kerberos, an authentication protocol based on symmetric cryptography system, has some inherent security flaws, such as undeniability, difficulty in key exchange, inability...
Key management is one of the most important issues of any secure communication. With the increasing demand for the transmission security in wireless sensor networks (WSNs), it is urgent to introduce the secure and reliable key management scheme into the WSNs. In this paper, we proposed a hierarchical key management scheme to ensure the security of the network services and applications in WSNs. Comparing...
In this paper, we propose a joint digital watermarking protocol for the multiparty multilevel DRM architecture using Garner's algorithm for the Chinese remainder theorem (CRT). Our protocol exploits the incremental nature of the computation of CRT by the Garner's algorithm. The proposed joint watermarking protocol embeds a single watermark signal into the content while taking care of the various security...
Group key management (GKM) is one of the primary issues for secure group communication (SGC). Contributory group key agreement is crucial for SGC over wireless and mobile ad hoc networks (MANETs) when there is lack of a fixed infrastructure and it is difficult to have a central trusted entity. Recently, Balachandran et al. proposed a contributory key agreement protocol for MANETs, called CRTDH (R...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.