Filters








13 Hits in 5.2 sec

Simulation of Route Optimization with load balancing Using AntNet System

Ashish Kumar Sharma Ashish Kumar Sharma
2013 IOSR Journal of Computer Engineering  
This paper is based on analysis of the performance of load balancing and route optimization in computerized networks.  ...  They select their path at each next node according the distribution of pheromones at each node. Packets between nodes are routed of the pheromone distributions at each next node.  ...  Chavhan and others who have contributed towards the preparation of the paper.  ... 
doi:10.9790/0661-1140107 fatcat:cj275itmxndyvomoapvvho5v3e

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles

T. H. Yuen, J. K. Liu, M. H. Au, W. Susilo, J. Zhou
2012 Computer journal  
Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity.  ...  Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme.  ...  Applications of ring signature schemes include whistle blowing [1] , anonymous membership authentication for ad hoc groups [11] , non-interactive deniable ring authentication [12] , smart grid systems  ... 
doi:10.1093/comjnl/bxs115 fatcat:vpms7na2lbgzhoiy77c5xqzzqa

POTSHARDS—a secure, recoverable, long-term archival storage system

Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti
2009 ACM Transactions on Storage  
Worse, an adversary who can compromise an archive need only wait for cryptanalysis techniques to catch up to the encryption algorithm used at the time of the compromise in order to obtain "secure" data  ...  Unfortunately, many of the security mechanisms that modern systems rely upon, such as encryption, are poorly suited for storing data for indefinitely long periods of time; it is very difficult to manage  ...  To test the benefits of this strategy, we utilized an initial n of n XOR-based split. Each of the resulting shares is then split using Shamir's m of n threshold scheme.  ... 
doi:10.1145/1534912.1534914 fatcat:jvezhkkqkbeqzo6g27i4kz2xra

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  Stephen Kent of BBN, who developed the RPKI concept, and whose guidance was critical to the accomplishment of this project.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Constraining Pseudorandom Functions Privately [chapter]

Dan Boneh, Kevin Lewi, David J. Wu
2017 Lecture Notes in Computer Science  
We also give two constructions based on concrete assumptions on multilinear maps which achieve slightly weaker notions of privacy and for more limited classes of constraints: namely, for the class of bit-fixing  ...  Our main notion of privacy captures the intuition that an adversary, given a constrained key for one of two circuits C 0 and C 1 , is unable to tell which circuit is associated with its key.  ...  Acknowledgments This work was funded by NSF, DARPA, a grant from ONR, the Simons Foundation, and an NSF Graduate Research Fellowship.  ... 
doi:10.1007/978-3-662-54388-7_17 fatcat:lu5msiz6pvcg7cudife5adpr4a

Security Architecture for Sensitive Information Systems [chapter]

Xianping Wu, Phu Dung, Balasubramaniam Srinivas
2010 Convergence and Hybrid Information Technologies  
The comparison criteria are selected based on the discussion in Chapter 2. Table 4.1. Key Managements Comparison.  ...  In this regard, one time pad keys 141 Security Comparison In this section (4.1), dynamic key management was introduced based on Definition 3.4.  ...  In addition, as described, when a user registers with the system, a unique secure ID i id is generated based on the security levels by either biometrics or a secure random number.  ... 
doi:10.5772/9641 fatcat:cdq2t26wcfc3vc5czgqog3h5pu

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
In post-quantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification , authentication, distance bounding and tag with ownership transfer protocols  ...  The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these  ...  Acknowledgment The author gratefully acknowledged the financial support of My PhD from the Ministry of Education Malaysia.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
electronic data storage and high transfer based devices, e-commerce, e-security, e-governance, and e-business.  ...  This investigation helps in clear understating of e-security challenges and possible implementation of the identified measurements for the challenges in wide area of network communications.  ...  Acknowledgments Acknowledgments This work is supported by the National Natural Science Foundation of China (Project 61303200, 61411146001).  ... 
fatcat:c2q6cwnb6vapbixa3b4ublzf3a

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+35 others)
2017 International Journal of Network Security   unpublished
Acknowledgments Acknowledgments The author greatfuly acknowledge the VIT Univerity for providing us an wonderful work infrastructure.  ...  Parts of this work were written during a very pleasant visit of Z. Chen  ...  Zhu, "Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme," Security and Communication Networks, vol. 8, no. 17, pp. 2981-2991, 2015. [19  ... 
fatcat:cx4zu3izovbdjienjl6tv64jna

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+100 others)
2016 International Journal of Network Security   unpublished
To overcome these shortcomings , we propose an improved version to make the RSA-based certificateless scheme stronger and more secure.  ...  Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system.  ...  Acknowledgments Acknowledgments This study was supported by the National Science Council of Taiwan under grant NSC102-2221-E-468-020 and NSC101-2622-E-468-002-CC3.  ... 
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu

Security architecture for sensitive information systems

Xianping Wu
2017
Issues such as dynamic sensitive information ownership, group authentication and authorization and privacy protection also create challenges for the protection of sensitive information systems.  ...  The proposed security architecture consists of dynamic key management, user-oriented group key management, authentication and authorization management and sensitive information management, which guarantee  ...  input feature B io X , extracted from the biometric data, and a claimed identity ID , it is possible to determine if ( , ; t is a predefined threshold.  ... 
doi:10.4225/03/587819f31a8b6 fatcat:p5xlru3rvnh47giifhmoucgxx4

Transparent and Mutual Restraining Electronic Voting

Huian Li
2019
One of the problems associated with most of existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance.  ...  is for the scenario of large number of voters where interaction is prohibitively expensive.  ...  A sender-deniable public key encryption based on RSA was proposed in [15] , and a receiver-deniable encryption scheme based on ElGamal was introduced in [35] . Zero-knowledge Proof.  ... 
doi:10.25394/pgs.7396943.v1 fatcat:wz67w3fn4ffw7ltsk56mvv3pbq

Short undeniable signatures:design, analysis, and applications

Jean Monnerat
2006
Digital signatures are one of the main achievements of public-key cryptography and constitute a fundamental tool to ensure data authentication.  ...  Motivated by such considerations, undeniable signatures, whose verification requires the cooperation of the signer in an interactive way, were invented.  ...  An adequate choice of the threshold value allows to succeed with an overwhelming success probability. GHIP Amplification.  ... 
doi:10.5075/epfl-thesis-3691 fatcat:njp7prdl3ffitghyoxas4qn7um