The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the first certificateless proxy re-signature scheme. Based on certificateless public cryptosystem, the scheme solves the using of certificate in certificate-based scheme and removes key escrow...
Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play an important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certificate based public key setting,...
Digital watermarking is an important technical measure for Intellectual property right protection. Due to the short lifetime of battery of portable device, reducing the energy consumption in this type of the device is sorely needed. In this paper, we proposed an energy efficient, low complexity, robust and secure watermarking algorithm in DS-CDMA communication. In this method, we spread multiple watermarks...
The hash-then-sign signature scheme's security relies on the collision resistance of the underlying hash function. To free this reliance, people introduced random value into the construction of the hash function, called randomized hashing. When the message provider and the signer are not the same person, the known randomized hashing-then-sign signature can protect the signer from the malicious message...
In mobile ad hoc networks (MANETs), timing information is easily available due to the use of a shared medium, even when the traffic is encrypted. This paper addresses how such timing information can be used for detecting packet forwarding activities in MANETs. Our results depend in part on the previous results on unidirectional flow detection. We first provide further analysis for the unidirectional...
This work investigates the vulnerability of analog network coding (ANC) to physical layer attacks from adversarial users, when all nodes are equipped with multiple antennas. Specifically, we examine the MIMO two way relay channel (TWRC) with two users trying to communicate with each other via a relay node in the presence of a passive eavesdropper. We propose a new performance metric, namely the secrecy...
Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently,...
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
The purpose of TPM authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The TPM treats knowledge of the AuthData as complete proof of ownership of the entity. The main specification defines an authorized user must provide the parent key AuthData before loading its child key and provide the child key AuthData before using it. All...
We describe the design and implementation of a secure and robust architectural data management model suitable for cultural environments. Usage and exploitation of the World Wide Web is a critical requirement for a series of administrative tasks such as collecting, managing and distributing valuable cultural and artistic information. This requirement introduces a great number of Internet threats for...
Wireless sensor networks (WSNs) have wide applications due to these sensor nodes ease of deployment.But the security of WSNs is still an important issue. Some existed approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches only address part of the problem of security in WSNs. However, these approaches are not sufficient for the unique characteristics and...
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these algorithms can only change the cover itself to be encrypted. In this paper, the invertible watermarking can be used to perform the encryption, which can not only use the additional information...
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes...
Scalable Video Coding(SVC) provides flexible adaptation to bandwidth fluctuations and device capabilities. Thus to preserve such adaptation capabilities many layered access control emerge. In this paper, through analyzing and modeling the bitstream of SVC we transform the scalable bitstream into a hierarchical structure, based on which we propose a secure and efficient hierarchical access control...
With the rapid development of wireless network technology, the extensive use of mobile office in government, military and financial industry makes information security an urgent and important problem to be solved. However, traditional security mechanisms focus on authentication and authorization without considering endpoint security. TNC is no other than based on endpoint integrity to extend the trusted...
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption in a logical single step,at lower computational costs and communication overheads than the traditional signature-then-encryption approach. In this paper,an ID-based proxy multi-signcryption scheme from pairings,which combines a proxy multi-signature scheme with a signcryptin,is...
The paper reveals the relationship between degenerate criterion and Chrestenson spectra of cryptographic functions over finite field. Two examples are proposed to show how we can decide whether a cryptographic function is degenerate through the support of its Chrestenson spectra, which can make us construct cryptographic function to resist substitution attacks by a new function with fewer variables.
In many applications, wireless sensor networks need to secure information. Actual researches found efficient solutions for this kind of network, principally by using cryptography to secure the data transfer. However an encrypted information send by the network can be sufficient to prevent an attacker, who eavesdrops the network, that something important has been detected. To avoid this situation,...
The features of terms in Cryptology are analyzed. A method of automatic term extraction based on extension of central strings is addressed, in view of linguistic and statistical characteristics. Experimental results indicate that in contrast to common methods, the velocity of extraction in the proposed method is improved as well as precision and receivable recall. When applied to Ontology learning...
Recently diverse studies have emerged on the ubiquitous environment including the ones on RFID tag. In terms of security, in particular, RFID tag is not able to provide complex forms of security services due to its hardware limits, putting in turn limits on its wider use. Therefore, this thesis is to suggest an improved RFID tag authentication scheme using face recognition scheme. It divides passive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.