Filters








20 Hits in 6.9 sec

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
So, during one of the coffee breaks, we decided to edit a book on this subject. Springer-Verlag promptly agreed to publish such a volume.  ...  The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective  ...  Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself  ...  Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace.  ...  Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 2014CB340601, 61332019, 61379139, U1135002, U1405255, 61431008, 2013CB329603).  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

An overview of cryptographic primitives for possible use in 5G and beyond

Jing Yang, Thomas Johansson
2020 Science China Information Sciences  
It discusses the new security challenges that come with 5G and presents the upcoming security architecture.  ...  It shows the use of current cryptographic algorithms and discusses new algorithms or modifications of existing ones, that can be relevant.  ...  Till now, there is no efficient cryptanalysis against SNOW 3G with the 128-bit security level.  ... 
doi:10.1007/s11432-019-2907-4 fatcat:bdapglaflnc75mzmmlxcb64veq

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The security of NTRU-based schemes depends on the difficulty of certain lattice problems.  ...  Note that depending on the WSN design, local revocation could be insufficient.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
other lattice-based signature schemes.  ...  After security, the performance was the next most important criterion in selecting the second-round candidates [3] . qTESLA is a lattice-based signature scheme which uses the assumption that RLWE distributions  ...  The primary goal of the blockchain would be to provide all LICCs with a common global ITS (Intelligent Transport Systems) infrastructure, whose adoption could be achieved organically, rather than procured  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.  ...  ., +, JIoT July 15, 2021 11678-11689 Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from  ...  the failures of existing security architectures and state-of-the-art defenses.  ...  [249] Homomorphic encryption Semi-trusted • Homomorphic encryption Quantum homomorphic encryption Complexity, high computation [243] Group-based signatures Semi-trusted • Attribute-based signatures  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
or persons as a result of operation or use of this publication and/or the information contained herein.  ...  No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording  ...  Zero knowledge proof protocol from Multivariate Public Key Cryptosystems [5] Fiat, A., Shamir, A. 1986 The research on the space-time statistic characteristics of moving Sonar reverberation and its  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source  ...  The series also serves as a forum for topics that may not have reached a level Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with VULNERABILITY ANALYSIS  ...  Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Lattice-based direct anonymous attestation

Nada El Kassem
2020
, into the world of lattice-based cryptographic schemes.  ...  Lattice-based cryptography is considered as a powerful candidate receiving lots of attention not only due to its conjectured quantum-attack resistance but also due to its security guarantee to provide  ...  Bernard et al. presented a full DAA security model achieved by randomizing the credential.  ... 
doi:10.15126/thesis.00855402 fatcat:6jk6dggcbva2liz4v4mmsshfam

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
Biometric recognition is discussed in detail wit pros and cons of the approach as a key e-security solution.  ...  In this context, this paper explores E-Security in terms of challenges and measurements. Biometric recognition is also investigated as a key e-security solution.  ...  Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 
fatcat:c2q6cwnb6vapbixa3b4ublzf3a

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
Nowadays, data hiding in compressed images becomes more and more popular because of the rise of the social media.  ...  Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and analyze their capacities and bit rates.  ...  Patankar for guidance, helpful discussions and a careful first reading of the manuscript.  ... 
fatcat:l5qol3fgizghrkdel7sgt3qz6q

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
To fix it, we suggest to replace the deterministic encryption with a probabilistic encryption.  ...  In 2007, Camenisch, Neven and Shelat proposed an adap-tive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other.  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China (Project 61303200, 61411146001), the Shanghai Leading Academic Discipline Project (S30104), the Scientific Research  ... 
fatcat:tup6p3z7pzc4dpeyn3blmj3foi

*Inform atica An International Journal of Computing and Informatics pecial Issue: Cryptology and Network Security Guest Editors

Francesco Bergadano, Chuan-Kun Wu
2002 unpublished
Acknowledgements The authors acknovvledge the support of the British Telecommunications plc. who funded this work and the help of the subjects who took part in the empirical study.  ...  If a group member has generated two group signatures, the verifier cannot find any connection betvveen them. -Revocation. Group manager can find who is the signer of a group signature when needed.  ...  There is a revocation algorithm that allovvs the group manager to find out who is the signer of a group signature.  ... 
fatcat:vhqpwpgjyreipdpafwxoiu6qy4

Secure Session Framework: An Identity-based Cryptographic Key Agreement and Signature Protocol

Christian Schridde, Mathematik Und Informatik, Freisleben, Bernd (Prof. Dr,)
2011
Users from one security domain can communicate with users from another security domain using encryption. This new property of independence is also carried over to a signature protocol.  ...  On the other hand, the method of lattice based reduction is successfully applied to the new area of secret sharing schemes. Finally, application scenarios for the protocol are presented.  ...  Signatures Next, a definition that is related to the security of an identity based signature scheme is given.  ... 
doi:10.17192/z2010.0472 fatcat:5xzikhgoqjhcporqtny5nhxr4a
« Previous Showing results 1 — 15 out of 20 results