A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Loxin — A solution to password-less universal login
2014
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
Loxin takes advantages of push message services for mobile devices and enables users to access multiple cloud services by using pre-owned identities, such as email addresses, together with few taps on ...
The application of the proposed Loxin security framework to the recent MintChip Challenge demonstrates the power of Loxin for building a real-world password-less mobile payment solution. ...
Certificate Authority (CA) A trusted public-key certificate authority.
Identity Provider (IDP) A trusted identity provider, such as an email account provider. ...
doi:10.1109/infcomw.2014.6849280
dblp:conf/infocom/ZhuFG14
fatcat:4rhmqe4wmrfazgjkmw7kzvhuom
Building a Secure Mobile Payment Protocol in the Cloud
2016
Open Journal of Social Sciences
The secure mobile payment protocol is established base all the above secure problems' solutions. ...
The identity authenticity of mobile payment user, the confidentiality and non repudiation of information transmitted in the mobile payment process are all the main secure problems. ...
The light weight signature and encryption protocol only use one key mechanism and a symmetric key to realize the signature and encryption process, the complexity is reduced. ...
doi:10.4236/jss.2016.47009
fatcat:d445rfvqkvgzfob56dwqz5hheu
A secure billing protocol over attribute-based encryption in vehicular cloud computing
2016
EURASIP Journal on Wireless Communications and Networking
Certificateless signature scheme is used to assure the authentication of legitimate vehicles which can enjoy the provided services. ...
In this paper, we present a secure billing protocol over attribute-based encryption in vehicular cloud computing. ...
Among them are micro-payment-based schemes such as MiniPay and Netpay [23] . These e-payment systems allow the users of cloud-based applications to securely and efficiently perform payments. ...
doi:10.1186/s13638-016-0687-0
fatcat:fecwoebuzvecdjvad5ierin2oi
The Research based on SSL and WPKI of Mobile E-commerce
2016
International Journal of Security and Its Applications
Such a scheme has been proved effective in local area network by test. ...
To solve these problems, a new scheme to reduce network delay and improve security level has been put forward. This scheme proposes to install a "routing box" in user's home at first. ...
Directory Server is used to provide identity information of users and certificate inquiry, store signed and issued digital certificates and keep latest certificate revocation list (CRL). ...
doi:10.14257/ijsia.2016.10.6.20
fatcat:oacgi5mwanfw3hhrqtnkvc64lu
Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability
2022
Sustainability
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. ...
SSI provides users with a way to control their personal information and consent for it to be used in various ways. ...
An identity system based on a public blockchain needs to function the same way to provide all identities. The Sovrin is built using open-source software and will provide open governance. ...
doi:10.3390/su14095400
fatcat:qswa3g2nmnfypjfyqopelljl7y
A Blockchain-Based Key-Revocation Access Control for Open Banking
2022
Wireless Communications and Mobile Computing
It also provides the customers with excellent cloud access to various providers' wide range of financial services. ...
This paper proposes a new access control scheme that employs blockchain for the key-revocation process. ...
A blockchain-based key-revocation access control (BKR-AC) scheme with dynamic revocation based on the key-revocation list requires the customer to be assigned a nonrevoked functional key to gain the permissions ...
doi:10.1155/2022/3200891
fatcat:63uqg6hcvrasbf6etkhcuv7tky
A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System
2019
Journal of Information Hiding and Privacy Protection
The purpose of this review is to look for original articles with novel ideas and solutions to address encryption security and information hiding technologies in cloud or fog-based Internet of Things systems ...
communication issues in cloud or fog computing/architecture Internet of Things systems. ...
Conclusion Through the above article, we discuss the security issues of cloud or fog-based (IoT) systems, including (1) Using pseudonyms, key management and revocation lists to provide authentication, ...
doi:10.32604/jihpp.2019.06043
fatcat:4r6jqlengzaungskj6qkjb6nsi
Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage
2019
IEEE Access
Collusion between revoked users and cloud service providers can pose a threat to the security of cloud storage data. ...
INDEX TERMS Cloud storage, group signature, integrity audit, user revocation, vector commitment. ...
SYSTEM MODEL The system model of our scheme consists of a cloud service provider and the corresponding cloud service consumer referred to herein as a valid group user and a trusted thirdparty auditor. ...
doi:10.1109/access.2019.2935180
fatcat:btmiwvlgv5cj3i4wpup2wa4vjq
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
2008
2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications
While anonymity related issues have been extensively studied in payment-based systems such as e-cash [1] and peer-to-peer (P2P) [2] systems, little effort has been devoted to wireless mesh networks (WMNs ...
Anonymity provides protection for users to enjoy network services without being traced. ...
pseudonym/ private key pairs based on the above public/private key pairs. • SIG Γx (m): the ID-based signature on a message m using the signer x's private key Γ x . • VER(SIG): the verification process ...
doi:10.1109/infocom.2007.230
fatcat:3vg67aupa5bczklx4wl3hpbzl4
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
2008
IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
While anonymity related issues have been extensively studied in payment-based systems such as e-cash [1] and peer-to-peer (P2P) [2] systems, little effort has been devoted to wireless mesh networks (WMNs ...
Anonymity provides protection for users to enjoy network services without being traced. ...
pseudonym/ private key pairs based on the above public/private key pairs. • SIG Γx (m): the ID-based signature on a message m using the signer x's private key Γ x . • VER(SIG): the verification process ...
doi:10.1109/infocom.2008.230
dblp:conf/infocom/SunZF08
fatcat:cdsyzjoeb5dz5nb43gz4xrq4oa
IOV Privacy Protection System Based on Double-Layered Chains
2019
Wireless Communications and Mobile Computing
Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP ...
) is designed to bring safety and zero-knowledge property to the system; finally, we give the application scenario of this IOV privacy protection system based on double-layered chain that it can be widely ...
Acknowledgments This research is supported by the National Key Research and Development Program of China (no. 2017YFB0802500).
Wireless Communications and Mobile Computing ...
doi:10.1155/2019/3013562
fatcat:u2qcxiqndndubo43av54rz4coa
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects. ...
In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services. ...
AA or PA can be applied in a range of applications and use cases including electronic voting, electronic identities, social networks, or mobile payments.
C. ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
Security and Privacy Based Data Sharing in Cloud Computing
2018
International Journal of Innovative Research in Engineering & Management
The data is protected in a fine-grained way by adopting the attribute based encryption technique. ...
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services. ...
While these techniques provides a good starting point for securing the big data, further research is needed to turn them into practical solutions that can achieve privacy and security in the real world ...
doi:10.21276/ijirem.2018.5.1.9
fatcat:w4ieubijjvaybjrrj22fgtq3p4
A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another
2021
Cybernetics and Information Technologies
This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key ...
Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key ...
Revocable Identity-Based Proxy Re-Signature (RIDPRS) and Server-Aided Revocable Identity-Based Proxy Re-Signature (SA-RIDPRS) proposed in (Y a n g et al. ...
doi:10.2478/cait-2021-0028
fatcat:47x4h2numbgx5duo6sdbcaqake
A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability
2012
IEICE transactions on information and systems
We present an electronic ticketing system that considers these security requirements and includes the exculpability as a security requirement for these systems, i.e. users and the service provider can ...
We show that the scheme is usable in practice by means of its implementation using mobile phones with Near Field Communication (NFC) capabilities. ...
Smart-Card-Based Smart-card-based proposals [2] , [4] - [9] establish a communication channel with the verification system. ...
doi:10.1587/transinf.e95.d.78
fatcat:2euqthxlvzb7djqjyzszjkjnj4
« Previous
Showing results 1 — 15 out of 572 results