Filters








2,693 Hits in 5.1 sec

Applications of quantum message sealing [article]

G Gordon Worley III
2005 arXiv   pre-print
Since then, some improvements on the method have been found.  ...  In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes.  ...  Alice then sends the message to Bob or posts it in a public location where they can both access it. 2 To check if the message is sealed, Alice sends Bob a copy of a proper subset of qubits in the sealed  ... 
arXiv:quant-ph/0504207v1 fatcat:qecmcar5zfcwvowmtpwiuheece

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications

Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
2017 2017 IEEE 30th Computer Security Foundations Symposium (CSF)  
have been proposed to detect cloned RFID/smart cards.  ...  In several case studies, we show how our mechanisms can be used to substantially increase the security guarantees of a wide range of systems, such as web logins, payment systems, or electronic door locks  ...  post-compromise security: security guarantees for communication after a party's long-term keys are compromised.  ... 
doi:10.1109/csf.2017.21 dblp:conf/csfw/MilnerCYR17 fatcat:ql4biikbkbd6xmcre2v2pswtim

State Management for Hash-Based Signatures [chapter]

David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016 Lecture Notes in Computer Science  
In this paper, we analyze state management in N -time hash-based signature schemes, considering both security and performance, and categorize the security issues that can occur due to state synchronization  ...  The unavoidable transition to post-quantum cryptography requires dependable quantum-safe digital signature schemes.  ...  Several ways to improve the performance of N -time signature schemes in practice exist.  ... 
doi:10.1007/978-3-319-49100-4_11 fatcat:qq54nyxr7naelmq2xdxhzwyica

Sealed States And Quantum Blackmail [article]

Andrew Lutomirski
2013 arXiv   pre-print
Abstract In this paper, I prove that any conventional quantum cryptographic protocol can give at best a very weak security guarantee.  ...  With quantum cryptography, on the other hand, the no cloning theorem implies that Charlie cannot simply copy a message and unseal the copy.  ...  .); this taxonomy will need to be extended to meaningfully discuss security in a post-quantum world (e.g. what is a non-adaptive chosen-quantum-ciphertext attack, and when is it relevant?).  ... 
arXiv:1308.6067v1 fatcat:xlxwko2fvbbdvi5smlm2ny3b7y

Online social networks security and privacy: comprehensive review and analysis

Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
2021 Complex & Intelligent Systems  
In addition to this, we have discussed numerous defensive approaches to OSN security.  ...  Finally, this survey discusses open issues, challenges, and relevant security guidelines to achieve trustworthiness in online social networks.  ...  It can detect the number of posts posted through a profile because generally, the adversary posts similar messages. (6) There is a need to secure users on discussion forums also.  ... 
doi:10.1007/s40747-021-00409-7 fatcat:s4mc4ydaa5hdhpgghwqsjmyruq

Colluding Identity Clone Prediction using Machine Learning

Anilkumara D N, Mohammed M Rehan Ahmed, Ramesh G
2019 IJARCCE  
These types of attacks are difficult to detect in because multiple malicious users may have a similar purpose to gain information from their targeted user.  ...  In this regard, the work intends to overcome this type of attack by addressing the problem of identity clones across multiple Online Social Networks using machine learning.  ...  They also explains the work which had been performed in the field of detecting clone profiles and cross site clones on OSN.  ... 
doi:10.17148/ijarcce.2019.8414 fatcat:v422op65kbhmrkzusjziotvwmq

Secure communications using nonlinear silicon photonic keys

Brian C. Grubel, Bryan T. Bosworth, Michael R. Kossey, A. Brinton Cooper, Mark A. Foster, Amy C. Foster
2018 Optics Express  
The PUFs' responses are never transmitted over the channel or stored in digital memory, thus enhancing security of the system.  ...  Subsequently, in a secure communications experiment with pairs of devices, we achieve bit error rates below 10^-5 at code rates of up to 0.1.  ...  Acknowledgments Portions of this work were presented at the Conference on Lasers and Electro-Optics in 2017, paper STh1N.5.  ... 
doi:10.1364/oe.26.004710 pmid:29475318 fatcat:wgws5y5mxne7xpoylgk34qrsom

Security Control and Privacy Preservation in RFID enabled Wine Supply Chain [chapter]

Manmeet Mahinderjit-Singh, Xue LI, Zhanhuai LI
2011 Designing and Deploying RFID Applications  
This is because tracking RFID tags is an essential step in cloning yet may compromise a partner's privacy (Mahinderjit-Singh & Li, 2009) .  ...  Similarly, in RFID clone and fraud detection, a false negative or failure to detect fraudulent tags could be very expensive with counterfeit items reaching the market and causing millions of dollars of  ...  In future work, we aim to extend our RFID cloning and fraud detection work by using an outlier detection technique to identify illegitimate RFID tags and designing an improved cost decision model to calculate  ... 
doi:10.5772/17496 fatcat:crmhdxelxzg5hggzbtf2pxyiae

Search on Security in Sensor Networks

Ping LI
2006 Journal of Software (Chinese)  
Security issue of sensor networks is greatly different from that of conventional networks, in terms of its specific requirements, constrained resources of nodes, and variety of network characteristics.  ...  Other open security issues and further challenges are also addressed.  ...  Acknowledgments Much of the review presented in this paper was the outcome of the first author's academic visit in MSA  ... 
doi:10.1360/jos172577 fatcat:v7teetycezh3xibqwyf6nf53y4

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
Specifically, we present a threat taxonomy considering: (i) threats in system-level security, (ii) threats and/or theft of services, and (iii) threats to privacy.  ...  Smart grid (SG) networks are newly upgraded networks of connected objects that greatly improve reliability, efficiency and sustainability of the traditional energy infrastructure.  ...  However, numerous schemes have been presented to improve routing security in smart grid [99] , [133] - [141] , as shown in Table IX.  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

How Reliable is the Crowdsourced Knowledge of Security Implementation? [article]

Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags
2019 arXiv   pre-print
We investigated whether SO incentive mechanism is effective in improving security properties of distributed code examples.  ...  We compiled 953 different groups of similar security-related code examples and labeled their security, identifying 785 secure answer posts and 644 insecure ones.  ...  In addition to sampling, clone detection facilitates our research in two further ways.  ... 
arXiv:1901.01327v1 fatcat:jberrvxb2zfybi2mvgqxpmxoea

Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal for Post COVID-19 Digital Era

KENNETH OKEREAFOR, Oluwasegun Adelaiye
2020 Figshare  
The social distancing practices triggered by the COVID-19 pandemic have caused a huge growth in the use of online technologies to support remote work, resulting in a sharp rise in computer crimes, privacy  ...  The RCSM extends traditional incident response and offers a pre-forensic guide as a precursor to the redefinition of cybersecurity in the post COVID-19 digital era.  ...  With a PhD in Cybersecurity from Azteca University Mexico, he is Deputy General Manager at Nigeria's National Health Insurance Scheme (NHIS) where he coordinates database security and health informatics  ... 
doi:10.6084/m9.figshare.12739163 fatcat:rdesw6noi5cm3keutqlwsietda

On the security issues of NFC enabled mobile phones

Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010 International Journal of Internet Technology and Secured Transactions  
In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform  ...  To illustrate the feasibility of these actions, we also show how to practically skim and emulate certain tokens typically used in payment and access control applications with a NFC mobile phone.  ...  strict timing for the transaction messages, the security of the contactless system can be improved.  ... 
doi:10.1504/ijitst.2010.037408 fatcat:gfhtqg3ulba4pdzbbrogms3u4i

Internet of things: security requirements, attacks and counter measures

Maria Imdad, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, Mohd Sanusi Azmi
2020 Indonesian Journal of Electrical Engineering and Computer Science  
Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits.  ...  Monitoring and control in IoT is done using smart phone and web browsers easily.  ...  This scheme is good in terms of network security and improves lifetime of a network [34] .  ... 
doi:10.11591/ijeecs.v18.i3.pp1520-1530 fatcat:3lvg6divjfbnfcfm6zswrizhii

A brief introduction of quantum cryptography for engineers [article]

Bing Qi, Li Qian, Hoi-Kwong Lo
2010 arXiv   pre-print
Another important topic that is covered here is the study of the security of practical QKD systems.  ...  Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis.  ...  It is this -post-selection‖ process introduced by Bob's detection system that correlates Eve's bits with Alice's bits, thus compromising security.  ... 
arXiv:1002.1237v2 fatcat:isqgjbjgurdr7emy4jnhnbtipe
« Previous Showing results 1 — 15 out of 2,693 results