The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an efficient adaptive oblivious transfer protocol with hidden access policies. This scheme allows a receiver to anonymously recover a message from a database which is protected by hidden attribute based access policy if the receiver's attribute set satisfies the associated access policy implicitly. The proposed scheme is secure in the presence of malicious adversary under the q-Strong Diffie-Hellman...
A proof of Data Possession (PDP) allows a client to verify that a remote server is still in possession of a file entrusted to it. One way to design a PDP, is to compute a function depending on a secret and the file. Then, during the verification stage, the client reveals the secret input to the server who recomputes the function and sends the output back to the client. The client can then compare...
Payment schemes based on mobile devices are expected to supersede traditional electronic payment approaches in the next few years. However, current solutions are limited in that protocols require at least one of the two parties to be on-line, i.e. connected either to a trusted third party or to a shared database. Indeed, in cases where customer and vendor are persistently or intermittently disconnected...
MySQL database identity authentication uses a CHAP protocol, that is, the challenge/response protocol, which exists the password expressly transmission, one-way authentication, random time can not grasp and other security issues. In this paper, we analyze the security problems of the existing MySQL database authentication protocol, and propose a new type MySQL integrated mutual authentication security...
Providing users with a lot of information might sound ideal in many scenarios, nonetheless, this may often be very annoying for the end user. To limit the amount of information that has to be processed by the user, to a set that is more relevant for his needs, most service providers use recommender systems. Undoubtedly, to provide someone with proper recommendations, one needs some background knowledge...
RFID (Radio frequency identification) technology which uses radio waves to identify objects has been applied widely. The security and privacy of the system is increasingly concerned. In this paper, we design a Trivium-like cipher algorithm without compromising the security and consuming less resource, which is called Enhanced-Trivium. We illustrate a Challenge-Response authentication protocol using...
The rising of cyber-physical systems (CPS) and Internet of Things (IoT) has significantly increase the industrial productivities and customer convenience. However, the widely distributed CPS and IoT systems also breeds new challenges among which security is a major concern. In order to help build secure and resilient CPS/IoT systems, systematic analyses are performed on CPS and IoT from individual...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
The smart mobile terminals and mobile broadband communications become more and more popular. Access control systems using traditional mechanical lock, IC card authentication and password authentication technology exposes more and more security issues. This paper describes the design and implementation of server authentication module. The server system used JAVA language development and JDBC technology...
Attempts to secure the enterprise network, even when using strong AAA (authentication, authorization and accounting) schemes, meet the user box spoofing and security middle boxes (firewalls and other filtering tools) bypassing problems. Seeking to strengthen the network security level, the names (users, addresses) and user machines must be bound tightly to the unambiguously defined network appliances...
Advanced Persistent Threat, one of the most popular network attacks, has drawn great attention of all over the world because of its huge perniciousness. As the excellent imperceptibility as well as long-term persistence in APT attack, this paper proposes a prediction model based on dynamin Bayesian game. Focusing on the particular features in APT, a corresponding quantitative method is proposed for...
In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.
In this paper we focused on authentication on low-cost devices. We proposed a new mutual authentication protocol suitable for implementation on low-cost devices. The proposed protocol is simple and uses only appropriate low-cost Hash functions and Physical unclonable functions (PUFs). The proposed protocol enables secure transmission of information from the one user to the another user. For this purpose...
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
We present here a scalable protocol for transaction management in key-value based multi-version data storage systems supporting partial replication of data in cloud and cluster computing environments. We consider here systems in which the database is sharded into partitions, a partition is replicated only at a subset of the nodes in the system, and no node contains all partitions. The protocol presented...
Since the concept of Software Defined Networking (SDN) was suggested, many SDN controllers have been proposed. In an early design of SDN controller, single SDN controller should manage a large-scale network. Although the SDN controller has innumerous advantages in the large-scale network, early SDN controllers have suffered from a bottleneck problem in the control plane. To mitigate the bottleneck...
Software-defined networking (SDN) is moving from its initial deployment in small-scale data center networks to large-scale carrier-grade networks. In such environments, high availability and scalability are two of the most prominent issues and thus extensive work is ongoing. In this paper, a well-known open source project, OpenDaylight (ODL) is analyzed in terms of network state database partition/synchronization...
Software-Defined Networking (SDN) provides a highly flexible flow management platform through a logically centralized controller that exposes network capabilities to the applications. However, most applications do not natively use SDN. An external entity is thus responsible for defining the corresponding flow management policies. Usually network operators prefer to control the flow management policies,...
Current deep learning methods have achieved human-level performance on Labeled Faces in the Wild (LFW) database, but we think it is because that the limited number of pairs on LFW do not capture the real difficulty of large-scale unconstrained face verification problem. Besides the intra-class variations like pose, illumination, occlusion and expression, highly visually similarity of different persons'...
This paper presents the friendship and selfishness forwarding (FSF) algorithm for Delay Tolerant Networks. This novel solution is based on two social characteristics of nodes: friendship and selfishness. When a contact opportunity arises, FSF analyzes two aspects to make message forwarding decisions: first, FSF assesses the friendship strength among the pair of nodes, then it determines the individual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.