Asia University

Displaying 1-18 of 18 results

  • White Papers // May 2013

    A Privacy Reinforcement Approach against De-identified Dataset

    Protection of individual privacy has been a key issue for the corresponding data dissemination. Now-a-days powerful search utilities increase the re-identification risk by easier information collection as well as validation than before. Despite there usually performs certain de-identified process, attackers may recognize someone from released dataset with which attacker-owned information...

    Provided By Asia University

  • White Papers // Jan 2013

    A New Proxy Signature Scheme for a Specified Group of Verifiers

    In this paper, the authors shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3, n3) shared verification based on the RSA problem. In this scheme, any t1 original signers can delegate the signing capability to the proxy group. After that, any t2 proxy signers can sign a...

    Provided By Asia University

  • White Papers // Jan 2013

    Guessing Attacks on Strong-Password Authentication Protocol

    In this paper, the authors have shown that the Optimal Strong Password Authentication (OSPA) protocol is vulnerable to the guessing attacks. Any adversary can guess a legal user's password without computing the complex algorithm. Password authentication is the most important and convenient protocol for verifying users to get the system's...

    Provided By Asia University

  • White Papers // Dec 2012

    Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index

    Radio Frequency IDentification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access...

    Provided By Asia University

  • White Papers // Dec 2012

    Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments

    Secure user authentication without repeating registration is one of the important issues in multi-server networks that needs to be adequately addressed. Recently, two-factor (smart card and password) based remote user authentication protocols have been widely introduced due to their low constructional cost and convenient usability for the authentication purpose. In...

    Provided By Asia University

  • White Papers // Sep 2012

    Wireless Application Protocol for Potential Threats to Mobile Agent Network Security

    The Wireless Application Protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are possibly infected with virus and worms. Though up to now there is no such attack, as the usage...

    Provided By Asia University

  • White Papers // Jul 2012

    An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation

    Secret image sharing, as an extension of secret sharing, has attracted the attention of many scholars in recent years. Multi-secret image sharing is an extension of traditional secret image sharing in which only one secret image can be shared among one group. In order to extend the utility of the...

    Provided By Asia University

  • White Papers // Jun 2012

    A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol

    The first electronic election mechanism enables people to electronically cast his/her ballot over insecure network. Recently, Chang and Lee presented an anonymous electronic voting (e-voting) scheme based on the key exchange protocol. Unfortunately, in this paper, the authors found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and...

    Provided By Asia University

  • White Papers // Apr 2012

    Security Enhancement of Chang-Lee Anonymous e-Voting Scheme

    In recent years, several electronic voting (e-voting) schemes for communication networks have been proposed. In 2006, Chang and Lee presented an anonymous electronic voting scheme which can be applied in real-world elections. However, this paper shows that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks. As a result, some...

    Provided By Asia University

  • White Papers // Sep 2011

    A Provably Secure Certificateless Proxy Signature Scheme

    Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-to-day office concerns. Therefore, a proxy signature scheme is...

    Provided By Asia University

  • White Papers // Jun 2011

    An Efficient Mutual Authentication Protocol for RFID Systems

    After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency IDentification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs,...

    Provided By Asia University

  • White Papers // Mar 2011

    Generalization of Proxy Signature Based on Factorization

    Digital signatures are widely used to replace hand-written signatures in the digital world. However, simple digital signature schemes are not enough to satisfy today's practical conditions. For example, suppose a chairman in a department needs to go on a business trip. She/He has to find a proxy person to deal...

    Provided By Asia University

  • White Papers // Dec 2010

    A Tabular Steganography Scheme for Graphical Password Authentication

    Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to...

    Provided By Asia University

  • White Papers // Aug 2010

    A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm

    A new secure knapsack cryptosystem based on the Merkle-Hellman public key cryptosystem will be proposed in this paper. Although it is common sense that when the density is low, the knapsack cryptosystem turns vulnerable to the low-density attack. The density d of a secure knapsack cryptosystem must be larger than...

    Provided By Asia University

  • White Papers // Feb 2010

    Data Steganography for Optical Color Image Cryptosystems

    In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to...

    Provided By Asia University

  • White Papers // Nov 2009

    On Security of An Efficient Nonce-based Authentication Scheme for SIP

    The Session Initiation Protocol (SIP) was proffered as the application layer's protocol by IETF (Internet Engineering Task Force) in 1999 and was built in RFC2543. SIP is the signaling protocol that controls communication on the Internet, establishing, maintaining and terminating the sessions. SIP is a client-server protocol. User authentication is...

    Provided By Asia University

  • White Papers // Mar 2009

    An Extended Certificate-Based Authentication and Security Protocol for Mobile Networks

    An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et...

    Provided By Asia University

  • White Papers // Dec 2008

    A New Convertible Authenticated Encryption Scheme Based on the Elgamal Cryptosystem

    A convertible authenticated encryption scheme allows a designated receiver to retrieve an authenticated ciphertext and convert the authenticated ciphertext into an ordinary signature. The receiver can prove the dishonesty of the sender to anyone if the sender repudiates the user's signature. Recently, many researchers have proposed convertible authenticated encryption schemes...

    Provided By Asia University

  • White Papers // Apr 2012

    Security Enhancement of Chang-Lee Anonymous e-Voting Scheme

    In recent years, several electronic voting (e-voting) schemes for communication networks have been proposed. In 2006, Chang and Lee presented an anonymous electronic voting scheme which can be applied in real-world elections. However, this paper shows that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks. As a result, some...

    Provided By Asia University

  • White Papers // Jun 2012

    A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol

    The first electronic election mechanism enables people to electronically cast his/her ballot over insecure network. Recently, Chang and Lee presented an anonymous electronic voting (e-voting) scheme based on the key exchange protocol. Unfortunately, in this paper, the authors found that Chang-Lee's e-voting scheme suffers from susceptibility to security attacks and...

    Provided By Asia University

  • White Papers // Dec 2012

    Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index

    Radio Frequency IDentification (RFID), which can be implemented in various applications, has become one of the most popular technologies for remote, automatic identification. Currently, many scientific researchers are focused on this issue with the goal of achieving high security and privacy protection. Recently, Chen et al. proposed an RFID access...

    Provided By Asia University

  • White Papers // Sep 2011

    A Provably Secure Certificateless Proxy Signature Scheme

    Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-to-day office concerns. Therefore, a proxy signature scheme is...

    Provided By Asia University

  • White Papers // Jun 2011

    An Efficient Mutual Authentication Protocol for RFID Systems

    After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency IDentification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs,...

    Provided By Asia University

  • White Papers // Mar 2011

    Generalization of Proxy Signature Based on Factorization

    Digital signatures are widely used to replace hand-written signatures in the digital world. However, simple digital signature schemes are not enough to satisfy today's practical conditions. For example, suppose a chairman in a department needs to go on a business trip. She/He has to find a proxy person to deal...

    Provided By Asia University

  • White Papers // Dec 2012

    Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments

    Secure user authentication without repeating registration is one of the important issues in multi-server networks that needs to be adequately addressed. Recently, two-factor (smart card and password) based remote user authentication protocols have been widely introduced due to their low constructional cost and convenient usability for the authentication purpose. In...

    Provided By Asia University

  • White Papers // Aug 2010

    A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm

    A new secure knapsack cryptosystem based on the Merkle-Hellman public key cryptosystem will be proposed in this paper. Although it is common sense that when the density is low, the knapsack cryptosystem turns vulnerable to the low-density attack. The density d of a secure knapsack cryptosystem must be larger than...

    Provided By Asia University

  • White Papers // Feb 2010

    Data Steganography for Optical Color Image Cryptosystems

    In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to...

    Provided By Asia University

  • White Papers // Mar 2009

    An Extended Certificate-Based Authentication and Security Protocol for Mobile Networks

    An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et...

    Provided By Asia University

  • White Papers // Sep 2012

    Wireless Application Protocol for Potential Threats to Mobile Agent Network Security

    The Wireless Application Protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are possibly infected with virus and worms. Though up to now there is no such attack, as the usage...

    Provided By Asia University

  • White Papers // Nov 2009

    On Security of An Efficient Nonce-based Authentication Scheme for SIP

    The Session Initiation Protocol (SIP) was proffered as the application layer's protocol by IETF (Internet Engineering Task Force) in 1999 and was built in RFC2543. SIP is the signaling protocol that controls communication on the Internet, establishing, maintaining and terminating the sessions. SIP is a client-server protocol. User authentication is...

    Provided By Asia University

  • White Papers // Jul 2012

    An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation

    Secret image sharing, as an extension of secret sharing, has attracted the attention of many scholars in recent years. Multi-secret image sharing is an extension of traditional secret image sharing in which only one secret image can be shared among one group. In order to extend the utility of the...

    Provided By Asia University

  • White Papers // Dec 2010

    A Tabular Steganography Scheme for Graphical Password Authentication

    Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to...

    Provided By Asia University

  • White Papers // Jan 2013

    A New Proxy Signature Scheme for a Specified Group of Verifiers

    In this paper, the authors shall propose a ((t1, n1), (t2, n2)) proxy signature scheme with (t3, n3) shared verification based on the RSA problem. In this scheme, any t1 original signers can delegate the signing capability to the proxy group. After that, any t2 proxy signers can sign a...

    Provided By Asia University

  • White Papers // Jan 2013

    Guessing Attacks on Strong-Password Authentication Protocol

    In this paper, the authors have shown that the Optimal Strong Password Authentication (OSPA) protocol is vulnerable to the guessing attacks. Any adversary can guess a legal user's password without computing the complex algorithm. Password authentication is the most important and convenient protocol for verifying users to get the system's...

    Provided By Asia University

  • White Papers // Dec 2008

    A New Convertible Authenticated Encryption Scheme Based on the Elgamal Cryptosystem

    A convertible authenticated encryption scheme allows a designated receiver to retrieve an authenticated ciphertext and convert the authenticated ciphertext into an ordinary signature. The receiver can prove the dishonesty of the sender to anyone if the sender repudiates the user's signature. Recently, many researchers have proposed convertible authenticated encryption schemes...

    Provided By Asia University

  • White Papers // May 2013

    A Privacy Reinforcement Approach against De-identified Dataset

    Protection of individual privacy has been a key issue for the corresponding data dissemination. Now-a-days powerful search utilities increase the re-identification risk by easier information collection as well as validation than before. Despite there usually performs certain de-identified process, attackers may recognize someone from released dataset with which attacker-owned information...

    Provided By Asia University