International Journal of Network Security

Displaying 1-40 of 95 results

  • White Papers // Jul 2014

    Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments

    Smart cards have been applied on password authentication in recent years. A user can input their identity and password to require services from the remote server. There are various attacks through an insecure network to obtain a user's information. Therefore, many schemes are proposed to guarantee secure communication. However, a...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

    Attribute-Based Proxy Re-Encryption (ABPRE) scheme is one of the proxy cryptography, which can delegate the re-encryption capability to the proxy and re-encrypt the encrypted data by using the re-encryption key. ABPRE extending the traditional proxy cryptography and attributes plays an important role. In ABPRE, users are identified by attributes, and...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Secure and Energy E

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Robust and Efficient Timestamp-Based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

    Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestamp-based remote user authentication scheme to eliminate the attacks in Shen et al.'s. However, the authors find that their scheme is vulnerable to the privileged insider,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Secure Requirement Prioritized Grid Scheduling Model

    Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

    As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless net-work standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Privacy Protection Data Access Control

    For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information brings the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards

    As one of the simplest and the most convenient mechanism to ensure secure communication in open networks, user authentication scheme has been studied widely. To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    A Survey on Various Cyber Attacks and Their Classification

    The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others....

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve

    Now-a-days, authentication had emerged to be an essential communication process in key establishment. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Wireless Honeypot: Framework, Architectures and Tools

    Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Security Flaw of an ECC-Based Signcryption Scheme with Anonymity

    Confidentiality, integrity, non-repudiation and authentication are the important requirements for many cryptographic applications. A traditional approach to achieve these requirements is to sign-then-encrypt the message. Signcryption, first proposed by the researchers, is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

    In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    A Fault Based Attack on MDS-AES

    In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

    In this paper, the authors propose a novel access control mechanism using the single-key-lock system and the Generalized Aryabhata Remainder Theorem (GART), in which each user is associated with a key and each digital file with a lock. Their mechanism possesses three unique features, a high efficiency of constructing the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Anonymous Multi-Receiver Encryption Based on RSA

    With the rapid development of information and network technologies, communication security has become an important issue in many applications. There are many public-key based encryption schemes proposed in the literature. Network applications are no longer just one-to-one type of communication; but it involves multiple receivers (>1) (e.g., multicast transmission). One-to-one...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy

    Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the two-party key...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    Cryptanalysis of NTRU with two Public Keys

    The NTRU public key cryptosystem is a ring-based cryptosystem that was first introduced in the rump session at Crypto'96. It is one of the fastest public-key cryptosystems, offering both encryption (NTRUencrypt) and digital signatures (NTRUSign). It is a relatively new cryptosystem that appears to be more efficient than the current...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Improved Fault Attack Against Eta Pairing

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Fault Attack Against Miller's Algorithm for Even Embedding Degree

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been proposed. Pairing based cryptosystems are usually embedded in resource constrained devices such as FPGAs and smart cards. While side channel attacks have imposed serious threats to such cryptography applications. Miller's algorithm is a critical step...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    Provably Secure Routing Protocol for Wireless Mesh Networks

    Ensuring security of an underlying routing protocol in Wireless Mesh Network (WMN) is a crucial issue because of the multi-hop communication environment and wireless media. This has been realized by various researchers, and several secure routing protocols have been proposed to ad-dress the security vulnerabilities. In this paper, the authors...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    An Efficient MQV Key Agreement Scheme

    The researcher proposed the first key agreement protocol (MQV) that employs a signature to sign Diffe-Hellman public keys without using a one-way hash function. The IEEE Standard Committee adopted the MQV protocol as a standard. In order to establish multiple common secret keys between two parties, Harn and Lin proposed...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secured Rfid Mutual Authentication Scheme for Mifare Systems

    This research study and analyze the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Network Threat Characterization in Multiple Intrusion Perspectives Using Data Mining Technique

    For effective security incidence response on the network, a reputable approach must be in place at both protected and unprotected region of the network. This is because compromise in the demilitarized zone could be precursor to threat inside the network. The improved complexity of attacks in present times and vulnerability...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

    Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by Certificate Authorities (CAs), The process of getting certificates from a...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Parallel Misuse and Anomaly Detection Model

    In this paper, a novel hybrid model is being proposed for misuse and anomaly detection. C4.5 based binary decision trees are used for misuse and CBA (Classification Based Association) based classifier is used for anomaly detection. Firstly, the C4.5 based decision tree separates the network traffic into normal and attack...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Differential Epidemic Model of Virus and Worms in Computer Network

    A differential electronic Susceptible-Infectious-Removed-Susceptible (e-SIRS) epidemic model of virus and worms in a computer network has been formulated. Latent period, immune period and time for self replication have been considered. Stability of the result is stated in terms of the threshold parameter. The authors have derived an explicit formula for...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks

    In this paper, the authors propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses 'authentic neighborhood' for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Securing Harari's Authentication Scheme

    Code-based authentication schemes are very fast and efficient for implementation in small devices. The security of these schemes and the size of underlying coding matrices are often the main barriers to their use in practice. In this paper, the authors remove the security flaw of a classical code-based authentication scheme...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment

    Identification is very important nowadays; whether there is need to identify persons, animals or objects, RFIDs provide a very good solution to the problem of identification and authentication. No one can deny the importance of authentication, it is done at the airport, at the railway station, in the library etc,...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing

    Only identities of the server and the user are authenticated in traditional smart cards based password authentication schemes, but the platform does not be verified, and which cannot provide enough protection on personal information of the user. A mutual authentication scheme based on smart cards and password is proposed under...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    An Efficient Password Authentication Scheme for Smart Card

    Remote user authentication using smart cards is a good solution for many e-based applications. Smart card implementation ensures secure communications. Several schemes using timestamp for remote authentication have already been proposed. However these are vulnerable to certain types of forgery attack. Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings

    A non-interactive, simple and efficient Publicly Verifiable Secret Sharing (PVSS) is constructed based on the bi-linear pairing on elliptic curves, which has all advantages of Schoenmakers' PVSS. Moreover, in the scheme's distribution of shares phase, only using bilinearity of bilinear paring, anybody can verify that the participants received whether correct...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-Based Singular Cubic Curve with AVK

    In this paper, the authors analyze application of Selective Encryption with Automatic Variable Key (AVK) for text based documents in Koyama Public Key Cryptosystem (PKC). In this paper, a new robust and simple PKC based singular cubic curve cryptosystem over the ring Zn, using selective encryption with Automatic Variable Key...

    Provided By International Journal of Network Security

  • White Papers // Nov 2010

    A Novel Digital Envelope Approach for A Secure E-Commerce Channel

    Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and m-commerce channels. To deal with these anxieties, various security etiquettes related to symmetric and asymmetric key types have been framed. Digital Envelope is one...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    Improving Identity-Based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks

    In this paper, the authors propose a novel identity-based random key pre-distribution scheme called the Identity Based key pre-distribution using a Pseudo Random Function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other existing key pre-distribution schemes. IBPRF always guarantees...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    A Novel Secure Self Proxy Signature Scheme

    Recently, Kim et al.'s proposed a new type of proxy signature scheme, called self proxy signature scheme. In their scheme, a signer, delegates his/her signing capability to himself/herself and uses the proxy private/public key pair as temporary keys. In this paper, the authors will demonstrate some security leaks inherent in...

    Provided By International Journal of Network Security

  • White Papers // Aug 2011

    A Semi-Fragile Image Content Authentication Technique Based on Secure Hash in Frequency Domain

    Image Authentication techniques enable the recipients to verify the integrity of the received image. In this paper, a semi-fragile image authentication technique based on secure hash generated with Orthogonal Polynomials based Transformation (OPT) coefficients is proposed. In this proposed scheme, the content based image feature is extracted from the OPT...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secured Rfid Mutual Authentication Scheme for Mifare Systems

    This research study and analyze the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Network Threat Characterization in Multiple Intrusion Perspectives Using Data Mining Technique

    For effective security incidence response on the network, a reputable approach must be in place at both protected and unprotected region of the network. This is because compromise in the demilitarized zone could be precursor to threat inside the network. The improved complexity of attacks in present times and vulnerability...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

    Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by Certificate Authorities (CAs), The process of getting certificates from a...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Review on IPv6 Security Vulnerability Issues and Mitigation Methods

    One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    A New Non Linear Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support

    In this paper, a non linear model is going to be used which develops data distributed over an Identified Value which is used as nonce (IV). Thus by properly considering a combination of key values which are non linear in nature, data is derived from the developed model. This set...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    Provably Secure and Efficient Identity-Based Signature Scheme Based on Cubic Residues

    Many Identity Based Signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are without pairings. Up to now, there still remains a challenge to construct a provably secure and efficient IBS scheme without pairings. In this...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

    Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user's authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user....

    Provided By International Journal of Network Security

  • White Papers // Nov 2011

    An Improved Efficient Remote Password Authentication Scheme With Smart Card Over Insecure Networks

    In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.'s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay at-tack, denial of service...

    Provided By International Journal of Network Security

  • White Papers // Sep 2011

    PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services

    Certified email is a value-added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation receipt showing that the message has been received by the recipient. Most of certified email protocols schemes have...

    Provided By International Journal of Network Security

  • White Papers // May 2010

    An Enhanced Remote User Authentication Scheme With Smart Card

    In 2000, Hwang and Li's proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li's scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, the author proposed a new remote user authentication scheme and...

    Provided By International Journal of Network Security

  • White Papers // Apr 2012

    Combating Good Point Set Scanning-Based Self-Learning Worms by Using Predators

    Good point set scanning-based self learning worms can reach a stupendous propagation speed in virtue of the non-uniform vulnerable-host distribution. In order to terminate such self-learning worms, this paper proposes an interaction model. Using the interaction model, the authors obtain the basic reproduction number. The impact of different parameters of...

    Provided By International Journal of Network Security

  • White Papers // Mar 2011

    Authenticated Key Agreement Scheme with Privacy-Protection in the Three-Party Setting

    Going along with the rapid development of web technologies, in some applications on demands, partners or staffs may make a great quantity of web transactions or personal communications anytime and anywhere. However, the partners could be distributed over different network domains. They require a communal trusted third party to help...

    Provided By International Journal of Network Security

  • White Papers // Mar 2012

    Secure Position Verification Approach for Wireless Ad-Hoc Networks

    Wireless ad-hoc networks technologies share a common requirement: each node in the network has to know its current position at any time and to share this knowledge with other nodes in the network. An attacker can deliberately attack the network by claiming to be at a different location or by...

    Provided By International Journal of Network Security

  • White Papers // Dec 2011

    Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem

    In the secure communication areas authenticated key exchange protocol is one of the most important cryptographic mechanism. In 1992, Bellovin and Merrit proposed the first Encrypted Key Exchange (EKE) family of key exchange protocols, which allow people to use easy to remember passwords without being threatened by dictionary attacks. In...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Secure and Energy E

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards

    As one of the simplest and the most convenient mechanism to ensure secure communication in open networks, user authentication scheme has been studied widely. To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Robust and Efficient Timestamp-Based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

    Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestamp-based remote user authentication scheme to eliminate the attacks in Shen et al.'s. However, the authors find that their scheme is vulnerable to the privileged insider,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Secure Requirement Prioritized Grid Scheduling Model

    Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

    As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless net-work standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Security Flaw of an ECC-Based Signcryption Scheme with Anonymity

    Confidentiality, integrity, non-repudiation and authentication are the important requirements for many cryptographic applications. A traditional approach to achieve these requirements is to sign-then-encrypt the message. Signcryption, first proposed by the researchers, is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    A Survey on Various Cyber Attacks and Their Classification

    The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

    In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the...

    Provided By International Journal of Network Security