The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the trusted computing platform, trust is typically established solely based on software measurements. Few works consider the trust of platform hardware. However, hardware trust is pretty important to a trusted computing platform. In this paper, we propose the notion of measuring hardware trust and introduce the defintion of hardware integrity measurement, which is similar to the software integrity...
The MICKEY 128 (Mutual Irregular Clocking KEY stream generator with a 128-bit key) is a stream cipher designed in response to the ECRYPT “Call for Stream Cipher Primitives” in 2005. For many applications, these implementations need to be resistant against side channel attacks, means; it should not be too easy to extract secret information from physical measurements on the device. This paper presents...
In many information management applications, sensitive information must be stored as a record and be retrieved when necessary. When the record is stored in a distributed way in multiple databases and shared by multiple users with different trust levels and accessing privileges, the trust management model is called M-to-M model. In this model, on one hand the record is stored in a distributed way;...
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from...
After intensive revision of different research materials on digital watermarking in related with our topic we find that fidelity, robustness, fragility, and modification are the key variables which need technical support during application. Using the secondary data we also state interrelated concepts of digital watermarking and show the problems in this regard through figure. In addition we develop...
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering...
Image scrambling is one important method in image encryption field. By using some characteristics of chaos system, e.g. the sensitivity to initial conditions, the sensitivity to parameter and the pseudo-randomicity, this paper presents one image scrambling algorithm based on chaotic mapping. In order to achieve an effect of image scrambling, each pair of pixel points is exchanged for all the possible...
According to the current key management scheme exist large computation, trusted centre and key update cycle size is difficult to determine problems, we proposed a scheme that is based on ECC fully self-organization Ad hoc key management in this paper. The scheme use ECC instead of RSA for large computation; in order to solve trusted centre, we use fully self-organization; by using a double key update...
Advanced Encryption Standard (AES) and state of art technology FPGAs (Field Programmable Gate Arrays) can be used together to mitigate the potential threats of interception of Satellite data and unauthorized access to the Satellite System. This paper discusses the implementation and verification of AES algorithm on Virtex 4 FPGA and its usage in the protection of Remote Sensing Satellite Data. The...
Encryption is an effective method to protect private information. But the operating system and the temporary file of privacy are usually ignored. There are not adequate mechanisms to protect temporary files, page files and system files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies,...
The degree to which a cryptographic protocol is susceptible to successful attacks or penetrations cannot be accurately calculated because of the more fine and fast algorithms to break ciphers, being introduced. To deal with the issue, analysis of a cryptographic protocol becomes more vital; and more exhaustive search for vulnerabilities is required. Kerberos is a widely used security protocol for...
In this paper, we propose an (n, n) threshold visual cryptography scheme for cheating prevention to improve the generic transformation for cheating prevention scheme (GTCP). We analysis the cheating problem in the GTCP, and present the cheating method applied it to attack on the GTCP. Then we construct the matrices for cheating prevention with following features: (a) each participant can't gain any...
This paper presents a logic for signature-based security protocols. We propose an object-oriented model for the execution of security protocols, where protocol roles are modeled as classes and the programs executed by them are modeled as member functions. Unlike most of the formal verification logics, our logic is closer to the cryptography used in security protocols, and can formalize and utilize...
The quantum communication is a new-style communication scheme based on quantum mechanics. It arouses much interest recently. In this paper, a novel quantum secure communication protocol is proposed. This is a quasi quantum secure direct communication protocol, since it closely unites the quantum key distribution and the classical communication. In the protocol, a key is distributed between both parties...
Certificateless public key cryptography is intermediate between identity-based and traditional PKI-based cryptography. Since the introduction of the notion of certificateless cryptography, it has got extensively improved. But it has been proved that it was impossible for a protocol to be secure against both the strong Type II adversary and malicious KGC adversary in the Al-Riyami and Paterson's model...
Mobile IPv6 allows mobile nodes to remain reachable while moving around in the Internet. In Mobile IPv6, each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location. This chapter...
This paper discusses the security protection mechanisms of digital content, including digital encryption, copying detection, information hiding and digital watermarking, etc. Comparative analyzes the affiliation and difference among them. And take text for example, introduces the current research situation of various mechanisms in the security protection on digital text, explores the application and...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the...
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.