A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection
[chapter]
2010
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Moreover, our results indicate that SAS is more robust to the byte distribution changes and noise injection attacks comparing to Polygraph and Hamsa. ...
When SAS processes packets in a suspicious flow pool, it uses data flow analysis techniques to remove non-critical bytes. ...
Polymorphism [20] usually uses a built-in encoder to encrypt original shellcode, and stores the encrypted shellcode and a decryption routine in the payload. ...
doi:10.1007/978-3-642-16161-2_1
fatcat:xbn7nzb2fzgvvafeizxy5sazkq
Quality Based Solution for Adaptable and Scalable Access Control in Cloud Computing
2014
International Journal of Grid and Distributed Computing
Attribute Based Encryption to protect data of the users and analyze its performance. ...
Cloud Computing Environment, the data presides over a set of networked resources and these data centers may be located in any part of the world and access of the data provided through Internet. ...
Encryption Techniques for Storing the User data and key Management, Self Encrypting drive to protect the data from the unauthorized access in case of maintenance of servers of the cloud. ...
doi:10.14257/ijgdc.2014.7.6.11
fatcat:lbbpxzkxgfe4bjn57bhbzs3cjm
Analysis of attribute-based cryptographic techniques and their application to protect cloud services
2019
Transactions on Emerging Telecommunications Technologies
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers. ...
In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. we also provide a detailed discussion of different reviewed ...
SA-KP-ABE Schemes Ostrovsky et al. 49 Liu et al. 53 proposed a SA-KP-ABE scheme adapted for cloud application. ...
doi:10.1002/ett.3667
fatcat:eu7rs5halbefrmbiipbf6t7c7e
Data confidentiality: to which extent cryptography and secured hardware can help
2006
Annales des télécommunications
Finally, this paper sketches a hybrid approach mixing data encryption, integrity control and secured hardware that could pave the way for future highly secured DBMS. ...
Data confidentiality has become a major concern for individuals as well as for companies and administrations. ...
The gain in confidence comes from the fact that an attack requires a conspiracy between DBA and SA. This solution can adapt to most DBMS products (Oracle, IBM DB2, SQL Server, Sybase). ...
doi:10.1007/bf03219909
fatcat:wtfn7f5lg5cbhcsdj24fclkvy4
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
2011
International journal of network security and its applications
Agent delight at trusted Host as agent originator by means of symmetric key encryption. By using chain relation with trusted host, redundancy will be reduced and efficiency will be improved. ...
We use TTP information with a host which is called Knowledge Based System (KBS) to maintain Trusted host Information. ...
The model is mainly consists of protection agreements, trust estimation mechanism and dynamic self-adaptive process, which can resist colluded truncation attack. ...
doi:10.5121/ijnsa.2011.3517
fatcat:c76vj3n3qnbgncoahoh4rtwywm
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment
2014
39th Annual IEEE Conference on Local Computer Networks
Technology advancements in smart mobile devices empower mobile users by enhancing mobility, customizability and adaptability of computing environments. ...
In this paper, in order to allow secure data access in mobile environment, we securely combine both the dynamic and static attributes and develop novel access control technique. ...
ACKNOWLEDGEMENTS This work was supported through the EPSRC Grants: "The Uncertainty of Identity: Linking Spatiotemporal Information Between Virtual and Real Worlds (EP/J005266/1)" and "TRUMP: A Trusted ...
doi:10.1109/lcn.2014.6925791
dblp:conf/lcn/LiRR14
fatcat:nmgvku3yond3vf6y3axbugh34i
Mimic Encryption Box for Network Multimedia Data Security
2020
Security and Communication Networks
According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, ...
Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet ...
Finally, the mimic encryption box uses a "one packet, one key" encryption mechanism and has a certain self-cleaning function with a self-transforming network capability and a feedback mechanism. ...
doi:10.1155/2020/8868672
fatcat:gebhs2wukzhzvbi3z2vh3s4w2y
Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
2017
Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security
In this paper, we propose to use Multivariate Quadratic Quasigroups (MQQ) to negotiate and share a secret key between two sensors. ...
The Internet Key Exchange (IKE) protocol is well known as a secure key exchange protocol to establish secure channels between two hosts. ...
In symmetric cryptography, two peers share a secret key and use it for encryption and decryption. ...
doi:10.5220/0006241902240231
dblp:conf/iotbd/EssadraouiK17
fatcat:44doraphdndyfaehoajkqjvmsq
Chip-Secured Data Access
[chapter]
2002
VLDB '02: Proceedings of the 28th International Conference on Very Large Databases
acting as a mediator between a client and an encrypted database. ...
With this statement in mind, we propose a solution called C-SDA (Chip-Secured Data Access), which enforces data confidentiality and controls personal privileges thanks to a clientbased security component ...
Acknowledgments The authors wish to thank Philippe Bonnet and Ioana Manolescu for their helpful comments on this paper. ...
doi:10.1016/b978-155860869-6/50020-2
dblp:conf/vldb/BouganimP02
fatcat:mrzdsk4sj5dcrnqtmdg6ru6syq
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging
[chapter]
2014
Lecture Notes in Computer Science
It leverages a combination of automated and manual analysis of security logs and alerts which originate from a wide and varying array of sources and are often aggregated into a massive data repository. ...
We introduce PillarBox, a tool for securely relaying SAS data in a security analytics system. ...
We thank Alina Oprea, Ting-Fang Yen and Todd S. Leetham for many useful discussions during the design and evaluation of PillarBox. ...
doi:10.1007/978-3-319-11379-1_3
fatcat:q7z4f2pvqvdzbhv2mhueoml76u
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
2014
ICTACT Journal on Communication Technology
In the Simulation section we have analyzed our proposed architecture for both proactive and reactive protocols. ...
Here one SPY Agent moves around the network and monitors the aggregator nodes i.e, the Cluster Heads for secure data collection. ...
The security for the data transmission is achieved through efficient encryption and decryption mechanism which is explained in [14] . ...
doi:10.21917/ijct.2014.0146
fatcat:ua5jby7udzgjthcknlppws6kei
User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data
2014
Computer Science and Information Systems
In this paper, we propose a user-centric software architecture for managing Ubiquitous Health Monitoring Data (UHMD) generated from wearable sensors in a Ubiquitous Health Monitoring System (UHMS), and ...
We describe a prototype implementation that performs a statistical analysis on a community of independent personal agents. ...
Finally, the SAS decrypts the results and finds that the average of the question which was submitted is 37.125 o C. ...
doi:10.2298/csis130120022d
fatcat:vx3u45m42fhkhflvzbxudxnaj4
Enhanced Trust Based Access Control for Multi-Cloud Environment
2021
Computers Materials & Continua
The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method. ...
This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue. ...
Hence a data protection mechanism with a self-contained module called Role-based access control enhanced using data-centric attribute-based encryption (DC-RBAC) was popularized [17] . ...
doi:10.32604/cmc.2021.018993
fatcat:dsscxk4xivawdln4fol3fb7v2u
Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring
2016
International Journal of Computing and Digital Systems
Decentralized energy system plans a significant role for developed countries in attenuating risks and security threats of the electricity sector and guarantee continuous electricity distribution in times ...
systems have failed in remote rural areas due to weak infrastructures; roads between urban habitations are in a very bad condition even if found, scattered communities and high losses, this makes grid ...
Intelligent: adapt and develop their action. 1. Autonomous: it has self-control.
2. Target-driven: it is pro-active.
3. Temporally continuous: it executes
continuously. ...
doi:10.12785/ijcds/050404
fatcat:p4ji4iqy6redvcheyppck2gvgu
Towards a Hybrid Public Key Infrastructure (PKI): A Review
[article]
2019
IACR Cryptology ePrint Archive
Also, the summary of the comparison, based on various features, is presented in a table. ...
In this paper, we have reviewed and compared such hybrid schemes which tried to combine both the certificate based PKC and ID-based PKC. ...
CI A = [ID A ||ID CA ||r A ||CertN o||P eriod||y CA ||E xt ] CA computes the signature parameter sA = x CA h(CI A ) + kA and sends (CI A , sA ) to Alice. Alice obtains her private key x A = sA + a. ...
dblp:journals/iacr/SinghBKV19
fatcat:hazur7hj4bdl7lpmudwuf54qxi
« Previous
Showing results 1 — 15 out of 685 results