A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Applied cryptography: Protocols, algorithms, and source code in C
1994
Computer Law and Security Review
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D. ...
FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians. ...
This scheme needs only one encrypted message and 100 different keys. ...
doi:10.1016/0267-3649(94)90017-5
fatcat:y5tchirflfdwno7dm4dv6ljx2a
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks
[article]
2018
arXiv
pre-print
Furthermore, they do not address End-to-End (E2E) data integrity, authenticity, and computing electricity bills based on dynamic prices. ...
A formal proof, probabilistic analysis are used to evaluate the security of EPIC, and ns-3 is used to implement EPIC and evaluate the network performance. ...
On the other hand, to recover the fine-grained reading of a victim meter from its homomorphic hash, based on Equation 2 or 8, the attacker must collude with all the victim's proxies to remove the hashes ...
arXiv:1810.01851v1
fatcat:dzp27mjtljab5o7voapmnucd3e
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
2019
IEEE Communications Surveys and Tutorials
Specifically, we present a threat taxonomy considering: (i) threats in system-level security, (ii) threats and/or theft of services, and (iii) threats to privacy. ...
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks. ...
Blending a number of asymmetric cryptographic techniques (e.g., identity-committable signature, zero-knowledge proof, and partially blind signature), Gong et al. ...
doi:10.1109/comst.2019.2899354
fatcat:67bz5glcfbbldpqagxmhvy2ssm
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID ...
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. ...
The blind signature involves two entities, namely: 1) a signer and 2) a signature requester, in which the content of a message is disguised from its signature. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
Secure information embedding into 1D biomedical signals based on SPIHT
2013
Journal of Biomedical Informatics
The design is based on the analysis of requirements for secure and efficient storage, transmission and access to medical tests in e-health environment. ...
This approach uses the 1D SPI-HT algorithm to compress 1D biomedical signals with clinical quality, metadata embedding in the compressed domain to avoid extra distortion, digital signature to implement ...
Acknowledgements This research work has been partially supported by Project TIN-2011-23792/TSI from the Ministerio de Economía y Competitividad (MINECO), the European Regional Development Fund (ERDF) and ...
doi:10.1016/j.jbi.2013.05.002
pmid:23707304
fatcat:bwn2s4ubfrgx7kfqmzgxx7vege
Public-Key Infrastructure
[chapter]
2013
Wireless Mobile Internet Security
All submissions underwent a thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries ...
In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received. ...
This research is a contribution to the European PRIME project and is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, the Research Fund K.U.Leuven ...
doi:10.1002/9781118512920.ch7
fatcat:hocfzfhi4rbuhmssop2hkwbc64
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective
2017
IEEE Transactions on Multi-Scale Computing Systems
Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. ...
Through these solutions we hope to alter the mindset of considering security as an afterthought in CPS development procedures. ...
This systemlevel PUF can be used to make a general authentication scheme that allows the verification of the integrity of the system by ensuring integrity of each of the components. ...
doi:10.1109/tmscs.2016.2569446
fatcat:fxgrfxbiufcwtawupcjwe5n3ti
Security and Privacy Issues in Wireless Mesh Networks: A Survey
[article]
2013
arXiv
pre-print
Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication ...
Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol ...
The authors have proposed use of a partially restrictive blind signature scheme [153, 154] in the ticket generation algorithm. ...
arXiv:1302.0939v1
fatcat:4bxooy2dubeopa3qbcyg5yvi3y
State of the Art on Mobility and Transport data protection technologies
2021
Zenodo
This document describes the legal provisions and risks associated with the collection of personal mobility and transportation data, along with design strategies and technologies to reduce or eliminate ...
In SFI, given a trajectory 𝑇𝑇, it is partitioned in groups of 𝑘𝑘 = ⌈1 𝛿𝛿 ⁄ ⌉ points and a random point is chosen from each group. ...
We should note that most of the authors' choices for the value of 𝛿𝛿 in the presented experiments are not aligned with the restrictions set on 𝛿𝛿 by Dwork and Roth 130 , that required 𝛿𝛿 to be ...
doi:10.5281/zenodo.6811373
fatcat:qwcyotcs3bds5jswcc6lgbonuq
The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution
1995
University of Pennsylvania law review
. § 241 makes it a felony for two or more persons to go in disguise on public highways or on the premises of another with the intent to prevent the free exercise and enjoyment of any legal right or privilege ...
Anyone holding Bob's key to his digital signature could masquerade as him and authenticate any transaction or correspondence (for example, in a raid on Bob's electronic bank account) with a digital signature ...
to the user because it is encrypted and mixed in with the garbage-like stream of characters that constitutes the signature. 8o6 SCHNEIER, supra note 12, at 313; see also id. at 390-92 (explaining how ...
doi:10.2307/3312529
fatcat:2lx6judk65b2flyzwpnkcusj4e
Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems
2013
IOSR Journal of Computer Engineering
The aim of this paper is to increase the transmission data rate which the high order modulation scheme with low coding redundancy is used. ...
In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. ...
Therefore there arises a necessity to convert the unstructured HTML format into a new structured format such as XML or XHTML. ...
doi:10.9790/0661-0960104
fatcat:rqf5wioj45gxxj6cha7lgg33ci
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code. ...
A Review on Cloud Computing Development Sugang Ma 222 229 236 243 249 259 267 275 282 288 300 305 REGULAR PAPERS Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model and Security ...
of IBE or PKE, and generates a signature of the resulting ciphertexts by a one-time signature scheme. ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
Privacy on the line: the politics of wiretapping and encryption
1998
ChoiceReviews
Although the bill was reported favorably out of committee, it was not heard of again. Several court decisions put a partial closure on the issue. One of these involved a St. ...
For example, the first digit of the day of the month can only be 0, 1, 2, or 3, and the first digit of the minute can never be more than 5. ...
society, 143 Brandeis on, 148, 149 Church Committee on, 137, 170, 170, [200] [201] [202] 11 dimensions of, [141] [142] 128-131, 194 legalization of, 192-195 limits on, 193-195 minimization of, 372 ...
doi:10.5860/choice.35-6456
fatcat:zlca7qql2ffevobnzs5qckmyqq
Security Architecture for Sensitive Information Systems
[chapter]
2010
Convergence and Hybrid Information Technologies
On the other hand, the distribution of keys delays the start of any exchange and places a burden on network capacity. ...
Session keys can be distributed by using a shared long-term key or a public key starting at every communication session. A one-time pad is normally exchanged via physical devices. ...
In addition, organizations issue electronic bills (e-bills) instead of paper bills in order to reduce the costs of paper bill delivery. ...
doi:10.5772/9641
fatcat:cdq2t26wcfc3vc5czgqog3h5pu
Security Analysis of PUF-based Key Generation and Entity Authentication
2017
Zenodo
To facilitate the registration of unique features, a so-called physically unclonable function (PUF) can be implemented on the IC. ...
A PUF circuit is designed to be sensitive to process variations, i.e., challenged with a binary input, it provides a binary, device-unique response. ...
It is stated that the server retains an old identifier i −1,v , but no further details are provided. We filled in the blanks to the best of our insights and exclude this part from cryptanalysis. ...
doi:10.5281/zenodo.2643392
fatcat:2pcr7p76qjbtnh36fuxsdk7enq
« Previous
Showing results 1 — 15 out of 43 results