43 Hits in 13.7 sec

Applied cryptography: Protocols, algorithms, and source code in C

1994 Computer Law and Security Review  
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D.  ...  FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians.  ...  This scheme needs only one encrypted message and 100 different keys.  ... 
doi:10.1016/0267-3649(94)90017-5 fatcat:y5tchirflfdwno7dm4dv6ljx2a

EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks [article]

Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya
2018 arXiv   pre-print
Furthermore, they do not address End-to-End (E2E) data integrity, authenticity, and computing electricity bills based on dynamic prices.  ...  A formal proof, probabilistic analysis are used to evaluate the security of EPIC, and ns-3 is used to implement EPIC and evaluate the network performance.  ...  On the other hand, to recover the fine-grained reading of a victim meter from its homomorphic hash, based on Equation 2 or 8, the attacker must collude with all the victim's proxies to remove the hashes  ... 
arXiv:1810.01851v1 fatcat:dzp27mjtljab5o7voapmnucd3e

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
Specifically, we present a threat taxonomy considering: (i) threats in system-level security, (ii) threats and/or theft of services, and (iii) threats to privacy.  ...  Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks.  ...  Blending a number of asymmetric cryptographic techniques (e.g., identity-committable signature, zero-knowledge proof, and partially blind signature), Gong et al.  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID  ...  This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks.  ...  The blind signature involves two entities, namely: 1) a signer and 2) a signature requester, in which the content of a message is disguised from its signature.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Secure information embedding into 1D biomedical signals based on SPIHT

Óscar J. Rubio, Álvaro Alesanco, José García
2013 Journal of Biomedical Informatics  
The design is based on the analysis of requirements for secure and efficient storage, transmission and access to medical tests in e-health environment.  ...  This approach uses the 1D SPI-HT algorithm to compress 1D biomedical signals with clinical quality, metadata embedding in the compressed domain to avoid extra distortion, digital signature to implement  ...  Acknowledgements This research work has been partially supported by Project TIN-2011-23792/TSI from the Ministerio de Economía y Competitividad (MINECO), the European Regional Development Fund (ERDF) and  ... 
doi:10.1016/j.jbi.2013.05.002 pmid:23707304 fatcat:bwn2s4ubfrgx7kfqmzgxx7vege

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
All submissions underwent a thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries  ...  In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  This research is a contribution to the European PRIME project and is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, the Research Fund K.U.Leuven  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Introduction to Cyber-Physical System Security: A Cross-Layer Perspective

Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark Tehranipoor
2017 IEEE Transactions on Multi-Scale Computing Systems  
Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms.  ...  Through these solutions we hope to alter the mindset of considering security as an afterthought in CPS development procedures.  ...  This systemlevel PUF can be used to make a general authentication scheme that allows the verification of the integrity of the system by ensuring integrity of each of the components.  ... 
doi:10.1109/tmscs.2016.2569446 fatcat:fxgrfxbiufcwtawupcjwe5n3ti

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication  ...  Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol  ...  The authors have proposed use of a partially restrictive blind signature scheme [153, 154] in the ticket generation algorithm.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

State of the Art on Mobility and Transport data protection technologies

2021 Zenodo  
This document describes the legal provisions and risks associated with the collection of personal mobility and transportation data, along with design strategies and technologies to reduce or eliminate  ...  In SFI, given a trajectory 𝑇𝑇, it is partitioned in groups of 𝑘𝑘 = ⌈1 𝛿𝛿 ⁄ ⌉ points and a random point is chosen from each group.  ...  We should note that most of the authors' choices for the value of 𝛿𝛿 in the presented experiments are not aligned with the restrictions set on 𝛿𝛿 by Dwork and Roth 130 , that required 𝛿𝛿 to be  ... 
doi:10.5281/zenodo.6811373 fatcat:qwcyotcs3bds5jswcc6lgbonuq

The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution

A. Michael Froomkin
1995 University of Pennsylvania law review  
. § 241 makes it a felony for two or more persons to go in disguise on public highways or on the premises of another with the intent to prevent the free exercise and enjoyment of any legal right or privilege  ...  Anyone holding Bob's key to his digital signature could masquerade as him and authenticate any transaction or correspondence (for example, in a raid on Bob's electronic bank account) with a digital signature  ...  to the user because it is encrypted and mixed in with the garbage-like stream of characters that constitutes the signature. 8o6 SCHNEIER, supra note 12, at 313; see also id. at 390-92 (explaining how  ... 
doi:10.2307/3312529 fatcat:2lx6judk65b2flyzwpnkcusj4e

Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

KannaRao Shatarasi KannaRao Shatarasi
2013 IOSR Journal of Computer Engineering  
The aim of this paper is to increase the transmission data rate which the high order modulation scheme with low coding redundancy is used.  ...  In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions.  ...  Therefore there arises a necessity to convert the unstructured HTML format into a new structured format such as XML or XHTML.  ... 
doi:10.9790/0661-0960104 fatcat:rqf5wioj45gxxj6cha7lgg33ci

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code.  ...  A Review on Cloud Computing Development Sugang Ma 222 229 236 243 249 259 267 275 282 288 300 305 REGULAR PAPERS Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model and Security  ...  of IBE or PKE, and generates a signature of the resulting ciphertexts by a one-time signature scheme.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
Although the bill was reported favorably out of committee, it was not heard of again. Several court decisions put a partial closure on the issue. One of these involved a St.  ...  For example, the first digit of the day of the month can only be 0, 1, 2, or 3, and the first digit of the minute can never be more than 5.  ...  society, 143 Brandeis on, 148, 149 Church Committee on, 137, 170, 170, [200] [201] [202] 11 dimensions of, [141] [142] 128-131, 194 legalization of, 192-195 limits on, 193-195 minimization of, 372  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Security Architecture for Sensitive Information Systems [chapter]

Xianping Wu, Phu Dung, Balasubramaniam Srinivas
2010 Convergence and Hybrid Information Technologies  
On the other hand, the distribution of keys delays the start of any exchange and places a burden on network capacity.  ...  Session keys can be distributed by using a shared long-term key or a public key starting at every communication session. A one-time pad is normally exchanged via physical devices.  ...  In addition, organizations issue electronic bills (e-bills) instead of paper bills in order to reduce the costs of paper bill delivery.  ... 
doi:10.5772/9641 fatcat:cdq2t26wcfc3vc5czgqog3h5pu

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
To facilitate the registration of unique features, a so-called physically unclonable function (PUF) can be implemented on the IC.  ...  A PUF circuit is designed to be sensitive to process variations, i.e., challenged with a binary input, it provides a binary, device-unique response.  ...  It is stated that the server retains an old identifier i −1,v , but no further details are provided. We filled in the blanks to the best of our insights and exclude this part from cryptanalysis.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq
« Previous Showing results 1 — 15 out of 43 results