Filters








364,003 Hits in 3.1 sec

Analysis and Design of ECC-based RFID Grouping-proof Protocol

Kang Hong-yan
2015 Open Automation and Control Systems Journal  
Aiming at the issues of the existing RFID grouping-proof protocol in security and privacy, an ECC-based RFID grouping-proof protocol is proposed based on the privacy model and the identification protocol  ...  The result of theoretical analysis indicates that this scheme meets the requirements of correctness, soundness and privacy, and compared with the similar schemes, this scheme has the higher efficiency.  ...  ACKNOWLEDGEMENTS This work is supported by scientific research project of Heze University (No. XY12KJ09) and the science and technology project of the Shandong province universities (No. J14LN21).  ... 
doi:10.2174/1874444301507011523 fatcat:jsfpyeesvndf5iw3xzb7qroqdq

A TPA Based Efficient Non-Repudiation Scheme for Cloud Storage

Wen Qi Ma, Qing Bo Wu, Yu Song Tan
2013 Advanced Materials Research  
It can provide a more security environment for these data. Against the big overhead in update process of current non-repudiation scheme, we propose three schemes to improve it.  ...  One of differences between cloud storage and previous storage is that there is a financial contract between user and the cloud service provider (CSP).  ...  It also provides a more security environment for proofs. Through performance analysis, we can see that the improved scheme reduce the overhead actually.  ... 
doi:10.4028/www.scientific.net/amr.765-767.1630 fatcat:axlujbr5ivhihh4mjmvtozntsq

A Scalable ECC-Based Grouping-proof Protocol for RFID Systems

Kang Hong-yan
2015 Open Automation and Control Systems Journal  
proof scheme, based on the difficulty of the elliptic-curve discrete logarithm, by analyzing the insufficiency of the existing grouping-proof protocol design proposal.  ...  The paper has proposed a grouping-proof protocol that can conduct parallel processing, specific to the problem of low generation efficiency of the grouping-proof protocol of the existing RFID grouping  ...  ACKNOWLEDGEMENTS This work is supported by scientific research project of heze university (No. XY12KJ09) and the science and technology project of the Shandong province universities (No. J14LN21).  ... 
doi:10.2174/1874444301507011674 fatcat:l3ygs3vatvegthahh4yznh3exy

A Study of Issues Related to Illegal and Criminal Acts in Securities in China

Zhijuan Chen
2019 Journal of Financial Risk Management  
The article mainly discusses the status quo of legal regulations on illegal and criminal acts in securities in China, analyzes major problems existing in the judicial practice, and puts forward relevant  ...  countermeasures and suggestions in terms of legislation, justice and law enforcement to solve relevant problems, in order to improve the governance mechanism for illegal and criminal acts in securities  ...  Secondly, improve the rules on burden of proof for illegal and criminal acts in securities, and introduce the rules on the presumption of causal relationship and inversion of burden of proof in the securities  ... 
doi:10.4236/jfrm.2019.84018 fatcat:kwjwi6pdffdhhlnmh5hjqd3wmu

Analysis and Improvement of ECC-based Grouping-proof Protocol for RFID

Kang Hong-yan
2016 International Journal of Control and Automation  
This paper proposes an improved ECC-based grouping-proof protocol on the basis of studying the grouping-proof protocol proposed by Batina et al. to solve the problems of existing grouping-proof protocols  ...  Finally, the security performance of the proposed protocol was proved and a comparison with the protocols proposed in the references was made.  ...  Acknowledgements This work was supported by scientific research project of Heze University (No. XY12KJ09) and the science and technology project of the Shandong province universities (No. J14LN21).  ... 
doi:10.14257/ijca.2016.9.7.32 fatcat:tukdtxujivhujjbhqwtua5o4ca

Improved Data Post-Processing in Quantum Key Distribution and Application to Loss Thresholds in Device Independent QKD [article]

Xiongfeng Ma, Norbert Lütkenhaus
2011 arXiv   pre-print
Security proofs of quantum key distribution (QKD) often require post-processing schemes to simplify the data structure, and hence the security proof.  ...  We apply our method to the security analysis of device-independent QKD schemes and of detection-device-independent QKD schemes, where in both cases one is typically required to assign binary values even  ...  This work is supported by NSERC via the Innovation Platform Quantum Works, the Discovery grant programme, and the Strategic Project Grant FREQUENCY, and by the Ontario Research Fund (ORF).  ... 
arXiv:1109.1203v1 fatcat:ep3d4j5jdfemxitvkxc3sgnvuy

A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext

Bo Meng
2009 Journal of Networks  
Internet voting protocol is the base of the Internet voting systems. Firstly, an improved proof protocol that two ciphertexts are encryption of the same plaintext is introduced.  ...  Secondly, a receipt-free and coercion-resistant Internet voting protocol based on the non-interactive deniable authentication protocol and an improved proof protocol that two ciphertexts are encryption  ...  The proof of security can be found in Ref.  ... 
doi:10.4304/jnw.4.5.370-377 fatcat:zmuuqs3wjre3petyexn47tsmv4

An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment

Vinothkumar Muthurajan, Balaji Narayanasamy
2016 The Scientific World Journal  
This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme.  ...  the effectiveness of HCSA in the cloud security model creation.  ...  Conflict of Interests The authors proclaim that there is no conflict of interests concerning the publication of this paper.  ... 
doi:10.1155/2016/4913015 pmid:26981584 pmcid:PMC4770155 fatcat:kz4umm7sgvcahitidu5pr6tm3q

ASAP

Qingxi Li, Wenxuan Zhou, Matthew Caesar, P. Brighten Godfrey
2011 Computer communication review  
Sources of Delay • Client, PV, and server overheads are low • A single PV server could handle tens of millions of clients • One PV is vulnerable to the attacker • Two PVs reduce the attacker's effectiveness  ...  proof verifying address ownership Bypass three way handshake Use a security proof verifying address ownership Piggyback connection setup on name resolution Require changes to Auth.  ... 
doi:10.1145/2043164.2018483 fatcat:4g2oliozkbfbtf5ggba6oc4u5a

Quantum cloning bound and application to quantum key distribution

Erik Woodhead
2013 Physical Review A. Atomic, Molecular, and Optical Physics  
We introduce a quantum cloning bound which we apply to a straightforward and relatively direct security proof of the prepare-and-measure Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol  ...  The approach we propose is able to handle the practical problem of source and detector alignment imprecisions in a simple way.  ...  The majority of recent generic security proofs have considered the entanglement-based variants of QKD protocols.  ... 
doi:10.1103/physreva.88.012331 fatcat:teosesckubbfblwebr3y4hgxne

Improvements on an authentication scheme for vehicular sensor networks

Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo
2014 Expert systems with applications  
Nevertheless, we find that the proof in Shim's paper does not actually prove that the scheme is secure in this level.  ...  Nevertheless, we find that the proof in Shim's paper does not actually prove that the scheme is secure in this level.  ...  Susilo is supported by the ARC Future Fellowship (FT0991397) and ARC Discovery Project (DPDP130101383).  ... 
doi:10.1016/j.eswa.2013.10.003 fatcat:evh2m5prfvgbbby64zzacpr7cy

Editorial about PROOFS 2015

Karine Heydemann, Letitia Li
2020 Journal of Cryptographic Engineering  
The goal of the PROOFS workshop is to promote methodologies that provably improve the security of embedded systems, especially those which contain cryptographic algorithms.  ...  PROOFS 2019 took place at a time where the world has begun to recognize the importance of developing security countermeasures against the rising tide of cyberattacks, including hardware-based ones on the  ... 
doi:10.1007/s13389-020-00236-5 fatcat:nxl32zxtjrhjnh6dyimzzru6qe

A High-security RFID Grouping Proof Protocol

Ping Huang, Haibing Mu
2015 International Journal of Security and Its Applications  
With this method, the performance of the grouping proof protocol will be improved.  ...  Based on the analysis of the existing RFID grouping proof protocols, a high security RFID grouping proof protocol is presented in this paper with a new key distribution method which can satisfy some necessary  ...  As a branch of the RFID security technologies, RFID grouping proof protocol [4] also causes concern gradually.  ... 
doi:10.14257/ijsia.2015.9.1.04 fatcat:k3fljz2vejba7gncy4dmcam7ra

The Research and Application of Webpage Temper-proofing System

Beihua Wu, Yongquan Wang
2012 International Journal of Wireless and Microwave Technologies  
The attack to websites, especially the exp losion of webpage interpolating incidents has become one of the most serious problems of it.  ...  Abstrac t With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern.  ...  In this paper, URLScan is deployed on IIS to improve the security of Web server. URLScan is a security tool that restricts the types of HTTP requests that IIS will process.  ... 
doi:10.5815/ijwmt.2012.03.03 fatcat:njsiaohkpfhgxcl4dyorui7sbq

On Session Key Construction in Provably-Secure Key Establishment Protocols [chapter]

Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005 Lecture Notes in Computer Science  
Both protocols carry proofs of security in a weaker variant of the Bellare & Rogaway (1993) model where the adversary is not allowed to make any Reveal query.  ...  We point out some errors in the existing proof for protocol 2P-IDAKA, and provide proof sketches for the improved Chen & Kudla's protocol.  ...  We present the arguments of the existing proof on why the Reveal query is not allowed, and present an improved protocol.  ... 
doi:10.1007/11554868_9 fatcat:neepyopcunfd7mufqezoe2s4au
« Previous Showing results 1 — 15 out of 364,003 results