The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to address the problems of cross domain access and dynamic authentication in the multi-level security virtual desktops, this paper proposes a authentication protocol based on multi-level security virtual desktops. Firstly, the user behavior authentication mechanism is introduced into the protocol. It could achieve the legitimacy of the dynamic authentication of user behavior and improve the...
The existing provably secure threshold decryption schemes based on the Lagrange interpolation can only be applied to the (t, n) threshold structure. The first provably secure identity-based threshold decryption scheme on access structure is proposed, in which the PKG gets the adversary structure from the access structure, and then according to the adversary structure, the PKG ingeniously distributes...
We show how modern interactive verification tools can be used to prove complex properties of vote-counting software. Specifically, we give an ML implementation of a votecounting program for plurality voting; we give an encoding of this program into the higher-order logic of the HOL4 theorem prover; we give an encoding of the monotonicity property in the same higher-order logic; we then show how we...
The electrical engineering approach to cache coherence is defined not only by the study of IPv7, but also by the natural need for A search 12. In fact, few cyberneticists would disagree with the valuation of write-back caches. Grafter, our new algorithm for cacheable configurations, is the solution to all of these problems.
Forcing faulty outputs of devices implementing cryptographic primitives in order to reveal some secret information is a well-known attack strategy. Tampering with the clock signal or the supply voltage are two popular techniques for generating erroneous behaviour. In this work we perform an in-depth analysis of the vulnerability of two different microcontroller platforms on clock and supply voltage...
Session Hijacking is one of the major threats in IEEE 802.11 Wireless LANs. Existing methodologies to overcome this attack seems to be non comprehensive. These Existing mechanisms to counter-act this attack increase the communicational overhead and load on the server and client. In this paper we propose a novel and robust mobile agent based mechanism to overcome the session hijacking attacks in IEEE...
Wireless sensor networks (WSN) refers to a group of spatially dispersed and dedicated sensors which have limited resources, bandwidth and communication capabilities. WSN have many applications like environment monitoring, health monitoring, battlefield surveillance for military etc. Due to the resource constraint and less communication power secure communications is not possible. Many key management...
In our paper will be presented some advances in procedures used for encryption and division of secret data, as well as modern approaches for management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will describe algorithms allowing for visual information division and sharing on the basis of...
One of the most crucial components of modern Information Technology (IT) systems is data. It can be argued that the majority of IT systems are built to collect, store, modify, communicate and use data, enabling different data stakeholders to access and use it to achieve different business objectives. The confidentiality, integrity, availability, audit ability, privacy, and quality of the data is of...
A flexible (2k, 2k) quantum image secret sharing (QISS) is proposed for the first time based on 1-qubit measurement scheme and the idea of strip. Through simple quantum measurements, a quantum image can be generated into 2k shares. When recovering the original secret image, strip operations which are proposed in quantum movie are applied on the shares and the secret image can be recovered in one piece...
Secure delivery of secret data on the Internet is an important research topic in digital communications. Data encryption and steganography are two common techniques used for sending secret data over a public computer network. Steganography utilizes a digital medium as a cover in the delivery of secret data. For medical and military image applications, reversibility is an important requirement in data...
One problem with most currently used transaction authentication methods is that they depend on the customer's computer for integrity of the information flow between customer and bank. This allows man-in-the-middle attacks to be conducted using malware for financial fraud. Some banks are implementing new authentication methods that allow customers to verify transactions received by a bank without depending...
The current public key infrastructure (pki) encryption/decryption methods are still vulnerable to attacks. The main issue is, the public key algorithm suffers no effective solutions which are natural within particular integer factorization, distinct logarithm and also elliptic curve interactions. It might be computationally possible for an individual to create public and private key set computationally...
This paper presents a hierarchical formal verification method for cryptographic processors based on a combination of a word-level computer algebra procedure and a bit-level decision procedure using PPRM (Positive Polarity Reed-Muller) expansion. In the proposed method, the entire datapath structure of a cryptographic processor is described in the form of a hierarchical graph . The correctness of the...
On-line merchants must have security protocol and procedures in place to carry out transactions more securely, Due to the popularity of e-commerce payment systems and the widespread use of the internet-based shopping and banking. In this paper we introduce an original blind signature based on quantum cryptographic principles providing unconditional security for off-line transactions. The proposed...
Data security has become a major subject in the cloud computing. Data integrity verification allows clients know whether the data storing in the cloud is secure or not. And data recovery also provides a reliable guarantee for the clients. However, the pre-processing for the files such as the works of hash, blocks' signature, and redundancy generation and data recovery causes a great challenge to the...
The massive amount of data transfer over internet raises different challenges such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide the data inside document files, where four symbols are used to embed the data inside the carrier file. The main process depends on a key to produce a symbol table and match the data to be hidden with the...
E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated with many existing e-voting techniques is the lack of transparency, leading to the failure to deliver voter assurance. In this work, we propose an assurable, transparent, and mutual restraining e-voting protocol that exploits the existing two-party...
This paper proposes a new image encryption technique based on a new chaotic system consists of joining two chaotic maps: the logistic chaotic map and the cubic chaotic map. This chaotic system is used to encrypt the R, G, B components of a colored image at the same time and the three components affect each other. So the correlations between R, G, and B components were reduced and the security of algorithm...
As our society increasingly depends on information systems, it is critical for government and private organizations to have access to a talented pool of individuals who are skilled in confronting threats to information security, responding to emergencies, protecting vital information technology assets, and helping to create policies that ensure the privacy of individuals. However, the educational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.