Filters








16 Hits in 6.2 sec

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are  ...  This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  [258] introduced a fuzzy identity-based encryption (fuzzy IBE) scheme based on lattices among the first realizations of quantum-resistant ABE. In 2014, Zhu et al.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from  ...  Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.  ...  Identity-based encryption denotes a public-key encryption method in which a user's public key is derived from their well-known identity (e.g., email).  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
However, apart from a few exceptions, e.g., encryption became widely used, PETs have not become a standard and widely used component in system design.  ...  It concludes with recommendations on how to overcome and mitigate these limits.  ...  Acknowledgements We have discussed this work with numerous people at various occasions; we thank for the valuable input we got from these discussions.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

Access Control for Databases: Concepts and Systems

Elisa Bertino
2010 Foundations and Trends in Databases  
Two important models from this period include the lattice-based model for information flow [33] and the Bell-LaPadula model [4] .  ...  An encryption function takes as input a block of data called plaintext and transforms it into a ciphertext with the help of an encryption key.  ... 
doi:10.1561/1900000014 fatcat:trrsnypzyvcq5phpgvee7dumva

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
We approached leading scientists in the respective fields and received favorable answers from all of them. We are now very happy to present this book.  ...  Scientists from all over the world gave talks on the state of the art of quantum computers and on cryptographic schemes that may be able to resist attacks by quantum computers.  ...  Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Logical concepts in cryptography

Simon Kramer
2007 ACM SIGACT News  
Applied concepts: (1) security of encryption schemes, (2) unforgeability of signature schemes, (3) attacks on encryption schemes, (4) attacks on signature schemes, and (5) breaks of signature schemes.  ...  This feature is the result of our wholistic conception of property-based (modal logics) and model-based (process algebra) formalisms.  ...  key from the server to the responder and to transmit from the server to the responder the intention of the initiator to communicate securely with the responder by means of the transported session key.  ... 
doi:10.1145/1345189.1345205 fatcat:wyk6rfbagbfwrasry7ohjjbq5q

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
decade, each and every work area of society are directly or indirectly depending on computers, highly integrated computer networks and communication systems, electronic data storage and high transfer based  ...  Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ...  [20] proposed a identity-based server-aided decryption scheme. Their scheme enables the receiver to decrypt the ciphertext without needing to compute paring with help of an external server.  ... 
fatcat:c2q6cwnb6vapbixa3b4ublzf3a

Security policies [chapter]

Ross Anderson, Frank Stajano, Jong-Hyeon Lee
2002 Advances in Computers  
It is a means for designers, domain experts and implementers to communicate with each other, and a blueprint that drives a project from design through implementation and validation.  ...  Previously, encryption devices were built with separate processors for the ciphertext, or Black end and the cleartext or Red end.  ...  copy of the pad on H3; and outputs the ciphertext.  ... 
doi:10.1016/s0065-2458(01)80030-9 fatcat:a6mybpml3zcxxm4diujbp3epre

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
the real requests, the security level of the attack is obtained with the aid from other WGAs.  ...  In recent years, there have been many broadcast encryption schemes such as identity-based BE [15] , attribute-based BE [18] , and anonymous identity-based BE [23] .  ...  Game F inal : This final game Game F inal is the same as Game q,2 , except that the challenge ciphertext is semi-functional encryption of random message, other than neither of the two chosen massages by  ... 
fatcat:l5qol3fgizghrkdel7sgt3qz6q

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+70 others)
2015 International Journal of Network Security   unpublished
The drawback results from the deterministic encryption used. To fix it, we suggest to replace the deterministic encryption with a probabilistic encryption.  ...  [12] proposed a unidirectional identity-based proxy re-encryption with chosen ciphertext attack secure. Their security is based on the random oracle model.  ...  Conclusions In this paper, we have proposed an identity-based signcryption scheme with revocation functionality.  ... 
fatcat:tup6p3z7pzc4dpeyn3blmj3foi

A survey and taxonomy on privacy enhancing technologies

Peter Zimmermann, A Min Tjoa, Johannes Heurix
2015
This is particularly important for persons dealing with this topic for the first time.  ...  For everyone dealing with the implementation of systems for data protection it is thus especially important to know recent developments and possibilities.  ...  The invisible proxy property refers to the fact that the "(...) adversary cannot distinguish a regular ciphertext from a re-encryption of a type-based ciphertext, even if the adversary can obtain all the  ... 
doi:10.34726/hss.2014.27609 fatcat:ay62znxqenecdei5y5ptlyt6bu

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording or otherwise, without written prior permission from  ...  Zero knowledge proof protocol from Multivariate Public Key Cryptosystems [5] Fiat, A., Shamir, A. 1986 The research on the space-time statistic characteristics of moving Sonar reverberation and its  ...  Protect the semantic network identity: Attribute-based searchable encryption over routing in named data network [1] Chaabane A, et al.  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
The series also serves as a forum for topics that may not have reached a level Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with VULNERABILITY ANALYSIS  ...  Song, and Douglas Maughan; ISBN: 978-0-387-32720-4 Bleumer; ISBN: 978-0-387-29313-2 Additional information about this series can be obtained from http://www.springer.com The goals of the Springer International  ...  Challenge-Handshake Authentication Protocol (CHAP) The Challenge-Handshake Ciphertext Ciphertext is the encrypted form of the message being sent.  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+95 others)
2017 International Journal of Network Security   unpublished
Sahai and Waters first proposed the attribute-based encryption [12] which was built on the Identity-Based Encryption(IBE). In IBE, the users' key and ciphertext are described by strings.  ...  Firstly, we classify the data which are collected from body area networks into different types, and use the ciphertext-policy attribute-based encryption to encrypt them.  ...  He received his B.S. degree from Northwest University for Nationalities, and received his M.S. and PhD degrees from Northwest Normal University.  ... 
fatcat:h5tpyf5dkzcgzpcbdeks6yon4m

Special Issue: IPTV and Multimedia Services

E Mikóczy, I Vidal, D Kanellopoulos, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+13 others)
2012 unpublished
rating profiles into a new ciphertext that is the encryption of the sum of the ratings of the original ratings.  ...  Formally, an encryption schema ( ) denotes the encryption function with encryption key and ( ) denotes the decryption function with decryption key .  ...  Locality preserving within-class scatter To begin with, we propose to minimize the local scatter compactness of each data point by linear coefficients that reconstruct the data point from other points.  ... 
fatcat:cxxsi44xkzaprdkzi4e72n6dg4
« Previous Showing results 1 — 15 out of 16 results