The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the recent past, the demand on High Throughput Computing has been increasing because of the new scientific challenges. Since the access to several computational resources to manage thousands of simulations can be difficult for scientists, different initiatives have tried to provide the scientific community with interfaces that are user-friendly for several computational resources. Usually,...
Space-filling curves have intrigued both artists and mathematicians for a long time. They bridge the gap between aesthetic forms and mathemtical geometry. To enable construction by computer, an efficient recursive algorithm for the generation of space-filling curves is given. The algorithm is elegant, short and considerably easier to implement than previous recursive and non-recursive algorithms,...
There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information...
Authentication and confidentiality are two sides of a coin. A group communication is said to be secure only if it preserve both authentication and confidentiality. A group communication is secure if every member of the group is a trusted person. Hence, individual security leads to group security. This paper proposes a new method for secure group communication by providing individual security, in which...
This paper introduces a new approach for implementing GF(2m) multiplication using Polynomial Residue Number Systems (PRNS). Irreducible trinomials are selected as the generating polynomials for the PRNS channels to enable conversion to-and-from PRNS to be implemented using simple XOR networks. A novel approach for modular reduction over GF(2m) is also presented for the PRNS architecture to achieve...
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even if the attacker (intruder) knows all the details...
This paper proposes the development of mathematical reasoning in undergraduate students through vector cryptography implemented in a software system. Mathematical reasoning is a cognitive function that could be improved using symmetric encryption techniques such as Hill Cipher, which implements the operations of the linear arithmetic spaces. The goal of this research project is that undergraduate...
Both Gaussian integers and Lucas sequences have been applied in cryptography. This paper presents the mathematical relationship between Lucas sequences and Gaussian integers. It also explores the complexity of Discrete Logarithm Problem (DLP) for Gaussian integers modulo prime by reducing it to Lucas Sequences DLP and real integer DLP. We demonstrate that the algorithms based on the Gaussian Integer...
Information privacy and security plays a major role in domains where sensitive information is handled, such as case studies of rare diseases. Currently, security for accessing any sensitive information is provided by various mechanisms at the user/system level by employing access control models such as Role Based Access Control. However, these approaches leave security at the knowledge level unattended,...
Mobile environment provides storage as a main service. Data storage is a desired property when users outsource their data to be stored in a place irrespective of the locations. File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage...
This paper analyzes two existing methods for securing Git repositories, Git-encrypt and Git-crypt, by comparing their performance relative to the default Git implementation. Securing a Git repository is necessary when the repository contains sensitive or restricted data. This allows the repository to be stored on any third-party cloud provider with assurance that even if the repository data is leaked,...
Reliability is an important issue in systems architecture. This paper focuses on a new class of invertible networks which are more reliable in the sense that if there is a failure in the physical components of the system then there always exists an alternate set of nodes to carry out the job in the complement. A graph G is said to be invertible if there exists an inverse vertex cover in G. The contribution...
With the fast development of international internet and information technology, the contradiction between the personal information circulation and the personal information legal protection is getting more and more serious. In order to solve the problem about the personal information circulation and its legal protection, firstly catch the meaning of the personal information circulation and its legal...
Cloud computing encourages the prototype for data service outsourcing, where data owners can avoid cost usage by storing their data in cloud storage centers. The ultimate problem of cloud computing technology is that, the service providers have to protect the user data and services. Secured systems should consider Confidentiality, Availability and Integrity as their primary option. The user encrypts...
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered...
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels internet traffic through worldwide network having number of relays to hide user's usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known...
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing...
Voice chat and conferencing services may be assumed to be private and secure because of strong encryption algorithms applied to the video stream. We show that information leakage is occurring in video over IP traffic, including for encrypted payloads. It is possible to detect motion and scene changes, such as a person standing up or walking past a camera streaming live video. We accomplish this through...
Message authentication codes (MACs) are classically used for preventing unauthorized and corrupted messages from being forwarded in a network. However, inherent energy limitations of wireless sensor networks (WSNs) make the application of most of the state-of-the art MACs unaffordable due to their large computation overhead. Therefore in this paper, in order to cope with this challenging concern,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.