Information and Communications University

Displaying 1-9 of 9 results

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Improved ID-Based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

    Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. proposed two-round ID-based AGKA protocol which...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    A Secure Clustering Scheme Over an Energy-Aware Routing Protocol for Monitoring Critical Conditions

    Wireless Sensor Network (WSN) is one of fundamental technologies for building ubiquitous computing environment. As the network consists of many sensor nodes with limited resources (i.e., computation, storage and battery), the network has more security vulnerabilities (i.e., Denial-of-Service attack, Sinkhole/Wormhole/Sybil attack, node compromise, message forgery and traffic analysis). Although routing...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Desynchronization and Cloning Resistant Light-Weight RFID Authentication Protocol Using Integer Arithmetic for Low-Cost Tags

    The cost of the tag is one of the important factors to their proliferation. Designing a secure and efficient light-weight authentication protocol is imperative to resist against all feasible attacks. In general, the low-cost tag is difficult to implement the traditional public key cryptosystem since the tag's limited storage capacity...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Internet Metadata Framework for Plug and Play Wireless Sensor Networks

    Metadata, self-describing data about sensor nodes and sensing data, is needed to understand different capabilities provided by heterogeneous sensor networks. However, storing metadata in resource constrained sensor nodes is infeasible in terms of increased memory costs and multi-hop communication overheads. More than this, sensor networks have difficulties with supporting XMLs...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Internet Metadata Framework for Plug and Play Wireless Sensor Networks

    Metadata, self-describing data about sensor nodes and sensing data, is needed to understand different capabilities provided by heterogeneous sensor networks. However, storing metadata in resource constrained sensor nodes is infeasible in terms of increased memory costs and multi-hop communication overheads. More than this, sensor networks have difficulties with supporting XMLs...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Improved ID-Based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

    Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. proposed two-round ID-based AGKA protocol which...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    A Secure Clustering Scheme Over an Energy-Aware Routing Protocol for Monitoring Critical Conditions

    Wireless Sensor Network (WSN) is one of fundamental technologies for building ubiquitous computing environment. As the network consists of many sensor nodes with limited resources (i.e., computation, storage and battery), the network has more security vulnerabilities (i.e., Denial-of-Service attack, Sinkhole/Wormhole/Sybil attack, node compromise, message forgery and traffic analysis). Although routing...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Desynchronization and Cloning Resistant Light-Weight RFID Authentication Protocol Using Integer Arithmetic for Low-Cost Tags

    The cost of the tag is one of the important factors to their proliferation. Designing a secure and efficient light-weight authentication protocol is imperative to resist against all feasible attacks. In general, the low-cost tag is difficult to implement the traditional public key cryptosystem since the tag's limited storage capacity...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University