Information and Communications University

Displaying 1-14 of 14 results

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Improved ID-Based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

    Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. proposed two-round ID-based AGKA protocol which...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    A Secure Clustering Scheme Over an Energy-Aware Routing Protocol for Monitoring Critical Conditions

    Wireless Sensor Network (WSN) is one of fundamental technologies for building ubiquitous computing environment. As the network consists of many sensor nodes with limited resources (i.e., computation, storage and battery), the network has more security vulnerabilities (i.e., Denial-of-Service attack, Sinkhole/Wormhole/Sybil attack, node compromise, message forgery and traffic analysis). Although routing...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Desynchronization and Cloning Resistant Light-Weight RFID Authentication Protocol Using Integer Arithmetic for Low-Cost Tags

    The cost of the tag is one of the important factors to their proliferation. Designing a secure and efficient light-weight authentication protocol is imperative to resist against all feasible attacks. In general, the low-cost tag is difficult to implement the traditional public key cryptosystem since the tag's limited storage capacity...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Internet Metadata Framework for Plug and Play Wireless Sensor Networks

    Metadata, self-describing data about sensor nodes and sensing data, is needed to understand different capabilities provided by heterogeneous sensor networks. However, storing metadata in resource constrained sensor nodes is infeasible in terms of increased memory costs and multi-hop communication overheads. More than this, sensor networks have difficulties with supporting XMLs...

    Provided By Information and Communications University

  • White Papers // Nov 2008

    Digital Signatures: Status and Challenge

    Digital signature is a central cryptographic primitive. Since the standard definition on the security of signature schemes is given in the paper, there have been many attempts to design practical and provably secure signature schemes in this security model. Different assumptions and tools have been used in these constructions. In...

    Provided By Information and Communications University

  • White Papers // Oct 2008

    Attribute-Based Ring Signatures

    Ring signature was proposed to keep signer's anonymity when it signs messages on behalf of a "Ring" of possible signers. In this paper, the authors propose a novel notion of ring signature which is called attribute-based ring signature. In this kind of signature, it allows the signer to sign message...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    Security and User Privacy for Mobile-RFID Applications in Public Zone

    To make RFID technology assist people in their daily lives, a new technology called "Mobile-RFID" (MRFID) is being considered. The mRFID technology incorporates RFID-reader functionality into portable handheld devices. In a public zone (e.g., street, shopping mall) one can use their mobile phone as an mRFID-reader to scan tagged merchandize...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    New Design of Generic Authentication Architecture Using ID-Based Cryptosystem in 3GPP

    Generic Authentication Architecture (GAA) is described in by 3GPP. The Generic Bootstrapping Architecture (GBA) is used to make the secure connection between the mobile device and various network applications such as mobile banking, ticketing services and etc. For the GAA, symmetric and asymmetric cryptosystem based architecture are specified in this...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment

    During service discovery, preserving privacy of end users and service providers is one of the challenging research issues in Ubiquitous Computing Environment (UCE). To solve this issue, the authors define service group and classify it into two cases: public service and private service. End users' privacy is important in public...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Internet Metadata Framework for Plug and Play Wireless Sensor Networks

    Metadata, self-describing data about sensor nodes and sensing data, is needed to understand different capabilities provided by heterogeneous sensor networks. However, storing metadata in resource constrained sensor nodes is infeasible in terms of increased memory costs and multi-hop communication overheads. More than this, sensor networks have difficulties with supporting XMLs...

    Provided By Information and Communications University

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University

  • White Papers // Dec 2009

    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction

    In this paper, the authors propose a grouping-proof protocol for RFID tags based on secret sharing. The proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. The authors also present a security...

    Provided By Information and Communications University

  • White Papers // Oct 2008

    Attribute-Based Ring Signatures

    Ring signature was proposed to keep signer's anonymity when it signs messages on behalf of a "Ring" of possible signers. In this paper, the authors propose a novel notion of ring signature which is called attribute-based ring signature. In this kind of signature, it allows the signer to sign message...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme

    Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosystems with a trusty server. However, in this paper, the authors will show that Lee-Hwang-Li's key authentication scheme is not secure, from the obtained public information,...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    A Lightweight, Privacy Preserving and Secure Service Discovery Protocol in Ubiquitous Computing Environment

    During service discovery, preserving privacy of end users and service providers is one of the challenging research issues in Ubiquitous Computing Environment (UCE). To solve this issue, the authors define service group and classify it into two cases: public service and private service. End users' privacy is important in public...

    Provided By Information and Communications University

  • White Papers // Jan 2011

    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

    A proxy signature protocol allows an original signer to delegate its signing power to another entity, called proxy signer, to sign messages on its behalf. The dele-gated proxy signer can compute a proxy signature that can be verified by anyone with access to the original signer's public key. Proxy signatures...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Improved ID-Based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

    Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. proposed two-round ID-based AGKA protocol which...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    A Secure Clustering Scheme Over an Energy-Aware Routing Protocol for Monitoring Critical Conditions

    Wireless Sensor Network (WSN) is one of fundamental technologies for building ubiquitous computing environment. As the network consists of many sensor nodes with limited resources (i.e., computation, storage and battery), the network has more security vulnerabilities (i.e., Denial-of-Service attack, Sinkhole/Wormhole/Sybil attack, node compromise, message forgery and traffic analysis). Although routing...

    Provided By Information and Communications University

  • White Papers // Jan 2009

    Desynchronization and Cloning Resistant Light-Weight RFID Authentication Protocol Using Integer Arithmetic for Low-Cost Tags

    The cost of the tag is one of the important factors to their proliferation. Designing a secure and efficient light-weight authentication protocol is imperative to resist against all feasible attacks. In general, the low-cost tag is difficult to implement the traditional public key cryptosystem since the tag's limited storage capacity...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    New Design of Generic Authentication Architecture Using ID-Based Cryptosystem in 3GPP

    Generic Authentication Architecture (GAA) is described in by 3GPP. The Generic Bootstrapping Architecture (GBA) is used to make the secure connection between the mobile device and various network applications such as mobile banking, ticketing services and etc. For the GAA, symmetric and asymmetric cryptosystem based architecture are specified in this...

    Provided By Information and Communications University

  • White Papers // Sep 2008

    Security and User Privacy for Mobile-RFID Applications in Public Zone

    To make RFID technology assist people in their daily lives, a new technology called "Mobile-RFID" (MRFID) is being considered. The mRFID technology incorporates RFID-reader functionality into portable handheld devices. In a public zone (e.g., street, shopping mall) one can use their mobile phone as an mRFID-reader to scan tagged merchandize...

    Provided By Information and Communications University

  • White Papers // Nov 2008

    Digital Signatures: Status and Challenge

    Digital signature is a central cryptographic primitive. Since the standard definition on the security of signature schemes is given in the paper, there have been many attempts to design practical and provably secure signature schemes in this security model. Different assumptions and tools have been used in these constructions. In...

    Provided By Information and Communications University

  • White Papers // May 2006

    Developing a Decision Model for Business Process Outsourcing

    Information Technology (IT) outsourcing has been one of the critical issues in organization management. Business Process Outsourcing (BPO) is an advanced type of IT outsourcing, which will be the next big wave in information technology services. Nevertheless, since prior studies have only examined issues related to traditional IS outsourcing, there...

    Provided By Information and Communications University