Filters








4,968 Hits in 3.0 sec

ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY

H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
One of the challenging issues for such environments is secure authentication.  ...  We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  ACKNOWLEDGEMENTS We wish to thanks the previous authors for providing a nice concept in the area of security.  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq

Strong mobile device protection from loss and capture

Zhengyi Le, Matt Bishop, Fillia Makedon
2009 Proceedings of the 2nd International Conference on PErvsive Technologies Related to Assistive Environments - PETRA '09  
In this paper, we present an approach to protect the private key by introducing a third party and bilaterally and proactively generating a random number to refresh key shares based on Bellare and Miner's  ...  forward secure signature scheme.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1145/1579114.1579144 dblp:conf/petra/LeBM09 fatcat:4skouhmeangsrjrp54df6uganu

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing

Yuesheng Zhu, Bojun Wang, Cheng Cai
2016 International Journal of Computer and Communication Engineering  
Traditional smart-card oriented authentication schemes provide a secure method for authorized users to login a remote server through insecure networks.  ...  However, the authentication procedures become complicated with abovementioned enhancements, so these enhanced schemes are not practical solutions for the smart card based authentication system.  ...  These schemes above provide a method for the remote server to authenticate a user. Chun-Ta Li [13] proposed a mutual authentication scheme between two communication parties.  ... 
doi:10.17706/ijcce.2016.5.3.196-205 fatcat:me64v3sbc5b6vomrqqqjxtvtmi

Untraceable Identity Management Framework for Mobile Access

Min-Chih Kao, Yi-Shiung Yeh, Chuan-Chi Wang
2008 2008 Eighth International Conference on Intelligent Systems Design and Applications  
the mobile user for accounting and authorization purposes.  ...  The proposed scheme has no need of a certificate revoke scheme in which the authentication process can only occur between the mobile user and an authenticator.  ...  For this, the IETF (Internet Engineering Task Force) suggests a three-party (the user, authenticator, and AAA) EAP (Extensible Authentication Protocol) framework that can extend to multiple AAAs scenarios  ... 
doi:10.1109/isda.2008.248 dblp:conf/isda/KaoYW08 fatcat:j74ho6gfszb6jokpaue5uauyfq

Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

Arif Sari, Mehmet Karay
2015 International Journal of Communications, Network and System Sciences  
, authorizing the right users and also encrypting the data over the network.  ...  There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating  ...  A digital signature it created and is verified by the asymmetric public/private key pair for authentication purposed.  ... 
doi:10.4236/ijcns.2015.813051 fatcat:onvfqdz7bjdwrnl6b6tyxx2why

Proving your location without giving up your privacy

Wanying Luo, Urs Hengartner
2010 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications - HotMobile '10  
For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this  ...  Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a  ...  Acknowledgements We thank the anonymous reviewers and our shepherd Ramón Cáceres for their helpful comments. This work is supported by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1145/1734583.1734586 dblp:conf/wmcsa/LuoH10 fatcat:qhv3z3hbgzdtjlyk5reu5o4kgq

ENHANCHING SECURITY FOR MANETs USING DISCRETE KEY GENERATIONS

ATEEQ AHMED H, SAMSON PAUL K, HARISH KUMAR REDDY B
2020 International Journal of Engineering Technology and Management Sciences  
Many attacks which often occur are based on the principle of Authentication, Confidentiality & Integrity.  ...  The connection is established for the duration of one session and requires no base station. Instead, devices discover others within range to form a network for those computers.  ...  Solution to proactive multi-secret Sharing Threshold Schemes For threshold multisecret sharing two schemes are in use CA-based and ID-based as proposed by.  ... 
doi:10.46647/ijetms.2020.v04i05.008 fatcat:4vdvqs6hfzhttl6ms3zlirs3q4

Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices

Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2021 2021 IEEE Symposium on Security and Privacy (SP)  
In particular we give a highly efficient tρ = 2 protocol to upgrade a number of standard (2, n) threshold signature schemes to proactive security with offline refresh.  ...  In this work we formulate the notion of refresh with offline devices, where any tρ parties may proactivize the system at any time and the remaining n − tρ offline parties can non-interactively "catch up  ...  They would also like to thank the anonymous reviewers for their feedback, which was useful in improving the paper.  ... 
doi:10.1109/sp40001.2021.00067 fatcat:hl6cetwt2bfpnbacawkuc6p2ri

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS: A REVIEW

JASPAL KUMAR, M. KULKARNI, DAYA GUPTA
2012 International journal of computer and communication technology  
Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers.  ...  Secondly, it must assure that a third party does not interfere by impersonating one of the two legitimate parties for the purpose of authorized transmission and reception.  ...  ARIADNE provides point-to-point authentication of a routing message using a message authentication code (MAC) [10] and a shared key between the two parties. ii.  ... 
doi:10.47893/ijcct.2012.1123 fatcat:6ql3nmqdxnaadgrpxdarry2r2y

Secret interest groups (SIGs) in social networks with an implementation on Facebook

Alessandro Sorniotti, Refik Molva
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
Members exchange credentials that can be used inside the social network to authenticate upon friendship requests or to secure user-generated content.  ...  To this end we present a set of cryptographic algorithms leveraging on well-studied primitives, and we describe a java implementation of the framework for Facebook.  ...  An OSBE scheme allows two parties to share a key iff a predefined party among the two possesses a signature on an agreed-upon message.  ... 
doi:10.1145/1774088.1774219 dblp:conf/sac/SorniottiM10 fatcat:xlzw4jffvbdt3j45vggjb3g55i

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
2020 Sensors  
To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied  ...  The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed  ...  Each of the IdPs has three specific modules: one for authentication and two for the issuance.  ... 
doi:10.3390/s20030945 pmid:32050726 pmcid:PMC7038966 fatcat:ocild5srwndkrco6agnbzk4bru

ZRP with WTLS Key Management Technique to Secure Transport and Network Layers in Mobile Adhoc Networks

Padmavathi G
2012 International Journal of Wireless & Mobile Networks  
The ultimate goal of the security solutions for MANET is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability to mobile users.  ...  The primary focus of this work is to provide transport layer security for authentication, securing end-to-end communications through data encryption. It also handles delay and packet loss.  ...  ACKNOWLEDGMENT The authors would like to thank the University Grants Commission (UGC) for supporting this Major Research project (MRP).  ... 
doi:10.5121/ijwmn.2012.4109 fatcat:gzh4crpghrazvlrntsxcby27dq

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

Oladayo Olufemi Olakanmi, Aminat Shodipo
2019 International Journal of Advanced Network, Monitoring, and Controls  
The scheme extracts the user's voice signature as the hash of the MFCC parameters of the voice and unique passcode which is used for the authentication.  ...  However, this is quite difficult especially for any network that is characterised with low computation and energy, and relied on the third party for key management.  ...  VOICE SIGNATURE BASED AUTHENTICATION SCHEME FOR ACCESS CONTROL The voice signature based authentication scheme involves two phases; registration and authentication phases.  ... 
doi:10.21307/ijanmc-2019-049 fatcat:kshdzarkijb3pazzonumfgrpzy

Brief announcement

Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina
2010 Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing - PODC '10  
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems.  ...  Our approach builds on webs of trust, a well-established and widely deployed decentralized infrastructure for establishing the authenticity of the binding between public keys and users, and more generally  ...  Acknowledgments This work was partially supported by the initiative for excellence and the Emmy Noether program of the German federal government and by Miur Project SOFT (Security Oriented Formal Techniques  ... 
doi:10.1145/1835698.1835753 dblp:conf/podc/BackesLMP10 fatcat:lygbso3xjjfuvhqaqbk5wzwt2y

VeriPlace

Wanying Luo, Urs Hengartner
2010 Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems - GIS '10  
In addition, VeriPlace can detect cheating users who collect proofs for places where they are not located.  ...  A user's location is a crucial factor for enabling these services. Many services rely on users to correctly report their location.  ...  Acknowledgements We thank the anonymous reviewers for their helpful comments. This work is supported by a Google Research Award and by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1145/1869790.1869797 dblp:conf/gis/LuoH10 fatcat:gthc46fhbfdpvnywvzw7vhzmwy
« Previous Showing results 1 — 15 out of 4,968 results