Filters








572 Hits in 5.9 sec

Loxin — A solution to password-less universal login

Bo Zhu, Xinxin Fan, Guang Gong
2014 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
Loxin takes advantages of push message services for mobile devices and enables users to access multiple cloud services by using pre-owned identities, such as email addresses, together with few taps on  ...  The application of the proposed Loxin security framework to the recent MintChip Challenge demonstrates the power of Loxin for building a real-world password-less mobile payment solution.  ...  Certificate Authority (CA) A trusted public-key certificate authority. Identity Provider (IDP) A trusted identity provider, such as an email account provider.  ... 
doi:10.1109/infcomw.2014.6849280 dblp:conf/infocom/ZhuFG14 fatcat:4rhmqe4wmrfazgjkmw7kzvhuom

Building a Secure Mobile Payment Protocol in the Cloud

Liping Du, Guifen Zhao, Ying Li
2016 Open Journal of Social Sciences  
The secure mobile payment protocol is established base all the above secure problems' solutions.  ...  The identity authenticity of mobile payment user, the confidentiality and non repudiation of information transmitted in the mobile payment process are all the main secure problems.  ...  The light weight signature and encryption protocol only use one key mechanism and a symmetric key to realize the signature and encryption process, the complexity is reduced.  ... 
doi:10.4236/jss.2016.47009 fatcat:d445rfvqkvgzfob56dwqz5hheu

A secure billing protocol over attribute-based encryption in vehicular cloud computing

Lewis Nkenyereye, Youngho Park, Kyung Hyune Rhee
2016 EURASIP Journal on Wireless Communications and Networking  
Certificateless signature scheme is used to assure the authentication of legitimate vehicles which can enjoy the provided services.  ...  In this paper, we present a secure billing protocol over attribute-based encryption in vehicular cloud computing.  ...  Among them are micro-payment-based schemes such as MiniPay and Netpay [23] . These e-payment systems allow the users of cloud-based applications to securely and efficiently perform payments.  ... 
doi:10.1186/s13638-016-0687-0 fatcat:fecwoebuzvecdjvad5ierin2oi

The Research based on SSL and WPKI of Mobile E-commerce

Jijun Xing
2016 International Journal of Security and Its Applications  
Such a scheme has been proved effective in local area network by test.  ...  To solve these problems, a new scheme to reduce network delay and improve security level has been put forward. This scheme proposes to install a "routing box" in user's home at first.  ...  Directory Server is used to provide identity information of users and certificate inquiry, store signed and issued digital certificates and keep latest certificate revocation list (CRL).  ... 
doi:10.14257/ijsia.2016.10.6.20 fatcat:oacgi5mwanfw3hhrqtnkvc64lu

Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability

Mohammed Shuaib, Noor Hafizah Hassan, Sahnius Usman, Shadab Alam, Surbhi Bhatia, Parul Agarwal, Sheikh Mohammad Idrees
2022 Sustainability  
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system.  ...  SSI provides users with a way to control their personal information and consent for it to be used in various ways.  ...  An identity system based on a public blockchain needs to function the same way to provide all identities. The Sovrin is built using open-source software and will provide open governance.  ... 
doi:10.3390/su14095400 fatcat:qswa3g2nmnfypjfyqopelljl7y

A Blockchain-Based Key-Revocation Access Control for Open Banking

Khaled Riad, Mohamed Elhoseny, Nima Jafari Navimipour
2022 Wireless Communications and Mobile Computing  
It also provides the customers with excellent cloud access to various providers' wide range of financial services.  ...  This paper proposes a new access control scheme that employs blockchain for the key-revocation process.  ...  A blockchain-based key-revocation access control (BKR-AC) scheme with dynamic revocation based on the key-revocation list requires the customer to be assigned a nonrevoked functional key to gain the permissions  ... 
doi:10.1155/2022/3200891 fatcat:63uqg6hcvrasbf6etkhcuv7tky

A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

Liang Bai, Yuzhen Liu, Xiaoliang Wang, Nick Patterson, F. Jiang
2019 Journal of Information Hiding and Privacy Protection  
The purpose of this review is to look for original articles with novel ideas and solutions to address encryption security and information hiding technologies in cloud or fog-based Internet of Things systems  ...  communication issues in cloud or fog computing/architecture Internet of Things systems.  ...  Conclusion Through the above article, we discuss the security issues of cloud or fog-based (IoT) systems, including (1) Using pseudonyms, key management and revocation lists to provide authentication,  ... 
doi:10.32604/jihpp.2019.06043 fatcat:4r6jqlengzaungskj6qkjb6nsi

Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage

Yinghui Zhang, Chen Chen, Dong Zheng, Dong Zheng, Rui Guo, Shengmin Xu
2019 IEEE Access  
Collusion between revoked users and cloud service providers can pose a threat to the security of cloud storage data.  ...  INDEX TERMS Cloud storage, group signature, integrity audit, user revocation, vector commitment.  ...  SYSTEM MODEL The system model of our scheme consists of a cloud service provider and the corresponding cloud service consumer referred to herein as a valid group user and a trusted thirdparty auditor.  ... 
doi:10.1109/access.2019.2935180 fatcat:btmiwvlgv5cj3i4wpup2wa4vjq

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

J. Sun, C. Zhang, Y. Fang
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
While anonymity related issues have been extensively studied in payment-based systems such as e-cash [1] and peer-to-peer (P2P) [2] systems, little effort has been devoted to wireless mesh networks (WMNs  ...  Anonymity provides protection for users to enjoy network services without being traced.  ...  pseudonym/ private key pairs based on the above public/private key pairs. • SIG Γx (m): the ID-based signature on a message m using the signer x's private key Γ x . • VER(SIG): the verification process  ... 
doi:10.1109/infocom.2007.230 fatcat:3vg67aupa5bczklx4wl3hpbzl4

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

J. Sun, C. Zhang, Y. Fang
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
While anonymity related issues have been extensively studied in payment-based systems such as e-cash [1] and peer-to-peer (P2P) [2] systems, little effort has been devoted to wireless mesh networks (WMNs  ...  Anonymity provides protection for users to enjoy network services without being traced.  ...  pseudonym/ private key pairs based on the above public/private key pairs. • SIG Γx (m): the ID-based signature on a message m using the signer x's private key Γ x . • VER(SIG): the verification process  ... 
doi:10.1109/infocom.2008.230 dblp:conf/infocom/SunZF08 fatcat:cdsyzjoeb5dz5nb43gz4xrq4oa

IOV Privacy Protection System Based on Double-Layered Chains

Yin Ru Chen, Jin Rui Sha, Zhi Hong Zhou
2019 Wireless Communications and Mobile Computing  
Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP  ...  ) is designed to bring safety and zero-knowledge property to the system; finally, we give the application scenario of this IOV privacy protection system based on double-layered chain that it can be widely  ...  Acknowledgments This research is supported by the National Key Research and Development Program of China (no. 2017YFB0802500). Wireless Communications and Mobile Computing  ... 
doi:10.1155/2019/3013562 fatcat:u2qcxiqndndubo43av54rz4coa

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects.  ...  In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services.  ...  AA or PA can be applied in a range of applications and use cases including electronic voting, electronic identities, social networks, or mobile payments. C.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
The data is protected in a fine-grained way by adopting the attribute based encryption technique.  ...  Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  While these techniques provides a good starting point for securing the big data, further research is needed to turn them into practical solutions that can achieve privacy and security in the real world  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

Shilpa Chaudhari, R. Aparna, Archana Rane
2021 Cybernetics and Information Technologies  
This article provides a survey summarizing and organizing PRS-related research by developing eight-dimensional taxonomy reflecting the directional feature, re-transformation capability, re-signature key  ...  Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which does not learn any signing-key  ...  Revocable Identity-Based Proxy Re-Signature (RIDPRS) and Server-Aided Revocable Identity-Based Proxy Re-Signature (SA-RIDPRS) proposed in (Y a n g et al.  ... 
doi:10.2478/cait-2021-0028 fatcat:47x4h2numbgx5duo6sdbcaqake

A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability

Arnau VIVES-GUASCH, Maria-Magdalena PAYERAS-CAPELLÀ, Macià MUT-PUIGSERVER, Jordi CASTELLÀ-ROCA, Josep-Lluís FERRER-GOMILA
2012 IEICE transactions on information and systems  
We present an electronic ticketing system that considers these security requirements and includes the exculpability as a security requirement for these systems, i.e. users and the service provider can  ...  We show that the scheme is usable in practice by means of its implementation using mobile phones with Near Field Communication (NFC) capabilities.  ...  Smart-Card-Based Smart-card-based proposals [2] , [4] - [9] establish a communication channel with the verification system.  ... 
doi:10.1587/transinf.e95.d.78 fatcat:2euqthxlvzb7djqjyzszjkjnj4
« Previous Showing results 1 — 15 out of 572 results