264 Hits in 9.1 sec

A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map

Hui Liu, Bo Zhao, Jianwen Zou, Linquan Huang, Yifan Liu
2020 Security and Communication Networks  
This paper outlines a design for a lightweight image encryption algorithm based on a message-passing algorithm with a chaotic external message.  ...  The external message can affect edge pixels, and then adjacent pixels interact with each other to produce an encrypted image.  ...  As one of the most important data carriers, multimedia contains large amounts of visual information and rich content.  ... 
doi:10.1155/2020/7151836 doaj:c15638cbfe864ddba2dbffc2f6dc4c07 fatcat:bkbkp27gtneunhmhuw3rnd7kki

TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control [article]

Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, Sylvia Ratnasamy
2020 arXiv   pre-print
At the same time, we must preserve the utility of this data by enabling authorized services to securely and selectively access and run analytics.  ...  Our evaluation of TimeCrypt shows that its memory overhead and performance are competitive and close to operating on data in the clear.  ...  This work was supported in part by the Swiss National Science Foundation Ambizione Grant, VMmware, Intel, and the National Science Foundation under Grant No.1553747.  ... 
arXiv:1811.03457v2 fatcat:u3bddqrprrffrd3m6rmvwxyvo4

An Overview of End-to-End Verifiable Voting Systems [article]

Syed Taha Ali, Judy Murray
2016 arXiv   pre-print
We trace the evolution of privacy and verifiability properties in the research literature and describe the operations of current state-of-the-art E2E voting systems.  ...  We hope our work serves as a useful resource and assists in the future development of E2E voting.  ...  Acknowledgements The authors wish to thank Peter Hyun-Jeen Lee and Feng Hao for constructive discussions and Siamak F. Shahandashti and Jeremy Clark for helpful comments on the manuscript.  ... 
arXiv:1605.08554v1 fatcat:hou2r6mkbzdphpopzngbzv47za

How do you make information security user friendly?

Andrew Jones
2009 Information Security Technical Report  
o n s e c u r i t y t e c h n i c a l r e p o r t 1 4 ( 2 0 0 9 ) 2 1 3 e2 1 6 messages and punitive actions, there is little chance that the perception of information security will improve.  ...  Some form of positive activity incentive scheme could focus attention on the topic of security and change the perception of the users.  ... 
doi:10.1016/j.istr.2010.04.001 fatcat:pqaruj6wkfff7e5ifj534fg3oq

D5.1: 5G Security Test Cases

Diana P. M. Osorio
2021 Zenodo  
This deliverable presents the set of test cases selected for validation on the INSPIRE-5Gplus project.  ...  This set of test cases were selected by performing an exhaustive requirements elicitation of 5G security use cases defined in WP2, stemming from the new and enhanced 5G security and trust/liability enablers  ...  The infrastructure is focused on the assessment of security mechanisms, as well as the impact to overall security posture of a 5G network.  ... 
doi:10.5281/zenodo.4569523 fatcat:paj4e3gsnjhapmdkn3wxtl5nri

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi
2010 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
The security schemes are based on Suite-B cryptographic algorithms, including: The Elliptic Curve Diffie-Hellman (ECDH) for key agreement, the Advanced Encryption Standard -Galois/Counter Mode (AES-GCM  ...  A key aspect of Suite-B is the deployment of Elliptic Curve Cryptography (ECC). The non-repudiation aspect of this thesis is based on the Suite-B's digital signature scheme; ECDSA.  ...  Encryption and digital signature may impact all the involved packets. The impact of security has been investigated in various references [101, 102, 1103, 104] .  ... 
doi:10.1109/wowmom.2010.5534971 dblp:conf/wowmom/Adibi10 fatcat:tzhws7t5tzao7eh7qcxfn5srfy

What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security

Francesca Musiani, Ksenia Ermoshina
2017 Westminster Papers in Communication and Culture  
Their most prominent initiative in this regard has been the 2014 release of the Secure Messaging Scorecard (SMS), a 7-criteria evaluation of 'usable security' in messaging systems.  ...  In today's diverse and crowded landscape of messaging systems, what are the most secure and usable tools?  ...  Acknowledgements This work is supported by the European Union's Horizon 2020 Framework Programme for Research and Innovation (H2020-ICT-2015, ICT-10-2015) under grant agreement nº 688722 -NEXTLEAP.  ... 
doi:10.16997/wpcc.265 fatcat:lrvrev2iyfccdjzix4izhpuguu

Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption

Albese Demjaha, Jonathan Spring, Ingolf Becker, Simon Parkin, Angela Sasse
2018 Proceedings 2018 Workshop on Usable Security   unpublished
Purpose: We methodically generate metaphors for end-to-end (E2E) encryption that cue functional models and develop and test the metaphors' effect on users' understanding of E2E-encryption.  ...  We hypothesise that one contributing factor to failed user understanding is poor explanations of security properties, as the technical descriptions used to explain encryption focus on structural mental  ...  DATASET The data and analysis methods from our survey are available at DOI 10.14324/000.ds.10042529.  ... 
doi:10.14722/usec.2018.23015 fatcat:i6jj66inmzcanorgon7bxmhi6q


Dr. G. M. A. Christy
2021 Zenodo  
Security of e-projecting a surveying structure systems does not just depend on the democratic protocol1 or the software used yet concerns the whole system with every one of its components.  ...  The methodology differs from other approaches to the extent that it uses a comprehensive methodology, visualizes the security circumstance of an e-projecting a surveying structure system clearly, and shows  ...  Beginning with the seminal work by Chaum, published in IEEE Security and Privacy in 2004, research on end-to-end (E2E) verifiable e-projecting a surveying structure has become a prospering field.  ... 
doi:10.5281/zenodo.5758450 fatcat:dhixzmjpjbfz5kc3dakyn5qh54

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Encryption Encryption is particularly important to ensure the confidentiality of data. Due to the rich set of new network services, E2E encryption is significant in 5G domain.  ...  . 2) Future Directions: One possible solution is to mitigate the quickly identify security treats or attacks on 5G networks and try to limit the impacts those attacks have on customers and other core network  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks

Farhan Ahmad, Virginia N. L. Franqueira, Asma Adnane
2018 IEEE Access  
The framework created has been tested with the implementation of three types of TMs (data oriented, entity oriented, and hybrid) under four different contexts of VANET based on the mobility of both honest  ...  Trust establishment among vehicles can ensure security of a VANET by identifying dishonest vehicles and revoking messages with malicious content.  ...  As a result, legitimate vehicles are unable to receive messages in-time, thus creating a strong impact on the network in terms of high E2E delay.  ... 
doi:10.1109/access.2018.2837887 fatcat:v435jar4nvgojgfgcfrloq4yqm

5G V2X System-Level Architecture of 5GCAR Project

Condoluci, Gallo, Mussot, Kousaridas, Spapis, Mahlouji, Mahmoodi
2019 Future Internet  
The work of the project focused on the following categories: (i) end-to-end security, also including aspects of privacy; (ii) network orchestration and management; (iii) network procedures; (iv) edge computing  ...  One of the goals of the 5G Communication Automotive Research and innovation (5GCAR) project has been to evaluate and propose system architecture enhancements aiming at supporting the strict requirements  ...  ., UE to V2X server application), or one-to-one End-To-End Security Two key requirements for V2X communication and applications are security and privacy, considering also the impact that procedures  ... 
doi:10.3390/fi11100217 fatcat:kkjx52ihtffgdonzklvxgpxvi4

Your Password Is Music To My Ears: Cloud Based Authentication Using Sound

Anthony Phipps, Karim Ouazzane, Vassil Vassilev
2021 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence)  
Whilst this removes barriers to use for those with accessibility challenges like visual impairment or motor skills issues and opens up a much more convenient user experience, a number of cyber security  ...  The popularity of these systems continues to grow as does the number of applications and scenarios they are used in.  ...  [4] Multi-factor voice driven authentication systems in high security environments such as online banking often have favourable perception with regards to security but at the expense of usability.  ... 
doi:10.1109/confluence51648.2021.9377126 fatcat:cbn5oakcrfdilk3pckrezicp74

Latency of Concatenating Unlicensed LPWAN with Cellular IoT: An Experimental QoE Study [article]

Alvin Ramoutar and Zohreh Motamedi and Mouhamed Abdulla
2021 arXiv   pre-print
Through extensive experimental measurement campaigns of 30,000 data points of E2E latencies, we show that the excess delay due to LPWAN interfacing introduces on average less than 300 milliseconds.  ...  To evaluate the real-life feasibility of this system, we first propose a concatenated LPWAN architecture and experimentally measure the statistics of end-to-end (E2E) latencies.  ...  The authors are also grateful to ENCQOR-5G program for testbed access. They also would like to acknowledge Keysight Technologies for research discussions regarding implementation and measurements.  ... 
arXiv:2105.10852v2 fatcat:mjmuysxczfhrjbo4xhpiq7gxai

A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications

Ali Seyfollahi, Ali Ghaffari, Zhaolong Ning
2021 Wireless Communications and Mobile Computing  
This paper is the first review to study intrusion detection systems in the RPL protocol based on machine learning (ML) techniques to the best of our knowledge.  ...  Each router part of the graph sends DODAG information object (DIO) control messages and specifies its rank within the graph, indicating its position within the network relative to the root.  ...  Analyzing encrypted traffic by IDS: encryption is one of the most common techniques for securing data on the network.  ... 
doi:10.1155/2021/8414503 fatcat:ync7q2ioaveqbkcczwchp2drv4
« Previous Showing results 1 — 15 out of 264 results