The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design. MANETs and WSN are the most common forms of Wireless media. In MANETs nodes are deployed or distributed in Ad-hoc way and they are communicating or exchange message using wireless Transmission...
We investigate the linear complexity and the minimal polynomial over the finite fields of sequences constructed on the basis of cubic residue classes. In particular, we find the linear complexity and the minimal polynomial of the characteristic sequence of cubic residue class and balanced cyclotomic sequences of order three.
Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents...
Blockchain represents a technology for establishing a shared, immutable version of the truth between a network of participants that do not trust one another, and therefore has the potential to disrupt any financial or other industries that rely on third-parties to establish trust. In order to better understand the current ecosystem of Blockchain applications, a scalable proof-of-concept pipeline for...
Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems...
With the rapid development of the Internet and mobile platform technology, the network application based on P2P/P2SP is increasing, which makes the network bandwidth resources become increasingly tight. Based on the protocol analysis, this paper studies the characteristics of the typical P2P/P2SP packet, and proposes the specific recognition scheme for the application of this kind of application,...
Due to the rapid growth of information acquisition in the era of the Internet of Things (IoT) and Cloud Computing, the concern about the security of private information raises a lot of interests. This paper investigates image sharing based on the concept of (k, n)-threshold strategy according to the Chinese remainder theorem (CRT). A secret image is distributed into n noise-like shadow images preserved...
Information disguising is one of means to insure information transmission security. In order to obtain a way to disguise information, this paper researches a disguising way that is transmitting false information to realize information security. The paper proposes F-disguise carrier information and F-disguise surplus information by using P-sets. By combining them, the paper proposes F-disguise information...
Advanced Metering Infrastructure (AMI) is an indispensable part of a Smart Grid (SG) initiative. AMI applications collect data measured by smart meters in the SG. This process may leak information about consumers. In this paper, we build an IEEE 802.11s-based SG AMI network testbed consisting of Beaglebone Black boards and investigate the performance of privacy-preserving protocols in real-life and...
This paper presents GREP, a highly scalable and efficient group rekeying protocol with the following merits. First, it rekeys the group with only two messages, introducing an overhead which is small, constant, and independent of the group size. Second, GREP considers collusion as a first-class attack. Third, GREP efficiently recovers the group from a collusion attack without recourse to a total member...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
It is not enough to be within the field of specialty, to gather various issues related to that field. The openness in the “field of scientific research” remain necessary and vital. Discipline describes types of knowledge, skills, projects, communities, problems, challenges, studies, approaches, and research areas which are strongly associated with academic areas of study or areas of professional practice...
Cloud computing being promising and emerging technology for the next generation of IT applications which provides the storage and supports for outsourcing of data without having the native copy of data or files. Cloud computing service providers require a system which can handle a large number of requests at a time and is needed to be highly available. Major issue faces in cloud computing is Security...
An attack which can be performed with a steganographic approach is detecting the presence of information in a file. There are three challenges involved in steganalysis. First, there is no guarantee for the presence of hidden data in a file. Second, there is a possibility for a data encrypted in the file. Third, for efficient transmission of message sender may add a noise in a cover medium. For overcoming...
Smart card is widely accepted device which is used as a second authenticating factor in remote user authentication schemes. Kim-Chung proposed a remote user authentication scheme and they claimed that their scheme resists various security problems which were present in previous schemes such as offline leakage of password, stolen verifier attack, chances of masquerading the entities of the scheme....
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as CIA triad. Confidentiality of any message or communication is secrecy of its content. All the modern cryptosystems provide cryptographic secrecy and not perfect secrecy. Two ingredients of perfect secrecy are truly random source and secure communication channel. Both are available in quantum computing paradigm...
Let p be an odd prime number as the characteristic of finite field, this paper introduces a pseudo random binary sequence generated by a primitive polynomial of degree 2 over Fp, trace function, and Legendre symbol. Then, its period and autocorrelation are introduced with a small example.
In secret sharing schemes, there is always a special participant called the dealer who controls the distribution of the secret S. It is so powerful that once the dealer is depraved, the whole system is to be paralyzed. In order to solve this problem, it is necessary to cancel the privilege of the dealer and realize completely fair secret sharing. In this paper, we make use of the excellent additivity...
Benefited from cloud storage services, users can save their cost of buying expensive storage servers. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored in cloud servers, which are the research issues the provable data possession (PDP) faces. This paper analyzes the existing PDP algorithms, finds some defects of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.