International Journal of Network Security

Displaying 1-40 of 96 results

  • White Papers // Jul 2014

    Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments

    Smart cards have been applied on password authentication in recent years. A user can input their identity and password to require services from the remote server. There are various attacks through an insecure network to obtain a user's information. Therefore, many schemes are proposed to guarantee secure communication. However, a...

    Provided By International Journal of Network Security

  • White Papers // Mar 2014

    "Notes on ""Polynomial - Based Key Management for Secure Intra - Group and Inter - Group Communication"""

    "In 2012, the researcher proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, they point out that there are some security weaknesses of the researcher intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members'...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

    Attribute-Based Proxy Re-Encryption (ABPRE) scheme is one of the proxy cryptography, which can delegate the re-encryption capability to the proxy and re-encrypt the encrypted data by using the re-encryption key. ABPRE extending the traditional proxy cryptography and attributes plays an important role. In ABPRE, users are identified by attributes, and...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Privacy Protection Data Access Control

    For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information brings the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

    As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless net-work standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Robust and Efficient Timestamp-Based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

    Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestamp-based remote user authentication scheme to eliminate the attacks in Shen et al.'s. However, the authors find that their scheme is vulnerable to the privileged insider,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Secure Requirement Prioritized Grid Scheduling Model

    Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Secure and Energy E

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards

    As one of the simplest and the most convenient mechanism to ensure secure communication in open networks, user authentication scheme has been studied widely. To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve

    Now-a-days, authentication had emerged to be an essential communication process in key establishment. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Wireless Honeypot: Framework, Architectures and Tools

    Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    A Survey on Various Cyber Attacks and Their Classification

    The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

    In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Security Flaw of an ECC-Based Signcryption Scheme with Anonymity

    Confidentiality, integrity, non-repudiation and authentication are the important requirements for many cryptographic applications. A traditional approach to achieve these requirements is to sign-then-encrypt the message. Signcryption, first proposed by the researchers, is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    A Fault Based Attack on MDS-AES

    In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy

    Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the two-party key...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Anonymous Multi-Receiver Encryption Based on RSA

    With the rapid development of information and network technologies, communication security has become an important issue in many applications. There are many public-key based encryption schemes proposed in the literature. Network applications are no longer just one-to-one type of communication; but it involves multiple receivers (>1) (e.g., multicast transmission). One-to-one...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

    In this paper, the authors propose a novel access control mechanism using the single-key-lock system and the Generalized Aryabhata Remainder Theorem (GART), in which each user is associated with a key and each digital file with a lock. Their mechanism possesses three unique features, a high efficiency of constructing the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    Cryptanalysis of NTRU with two Public Keys

    The NTRU public key cryptosystem is a ring-based cryptosystem that was first introduced in the rump session at Crypto'96. It is one of the fastest public-key cryptosystems, offering both encryption (NTRUencrypt) and digital signatures (NTRUSign). It is a relatively new cryptosystem that appears to be more efficient than the current...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Improved Fault Attack Against Eta Pairing

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Fault Attack Against Miller's Algorithm for Even Embedding Degree

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been proposed. Pairing based cryptosystems are usually embedded in resource constrained devices such as FPGAs and smart cards. While side channel attacks have imposed serious threats to such cryptography applications. Miller's algorithm is a critical step...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    Provably Secure Routing Protocol for Wireless Mesh Networks

    Ensuring security of an underlying routing protocol in Wireless Mesh Network (WMN) is a crucial issue because of the multi-hop communication environment and wireless media. This has been realized by various researchers, and several secure routing protocols have been proposed to ad-dress the security vulnerabilities. In this paper, the authors...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    An Efficient MQV Key Agreement Scheme

    The researcher proposed the first key agreement protocol (MQV) that employs a signature to sign Diffe-Hellman public keys without using a one-way hash function. The IEEE Standard Committee adopted the MQV protocol as a standard. In order to establish multiple common secret keys between two parties, Harn and Lin proposed...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Network Threat Characterization in Multiple Intrusion Perspectives Using Data Mining Technique

    For effective security incidence response on the network, a reputable approach must be in place at both protected and unprotected region of the network. This is because compromise in the demilitarized zone could be precursor to threat inside the network. The improved complexity of attacks in present times and vulnerability...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

    Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by Certificate Authorities (CAs), The process of getting certificates from a...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    Knapsack Based ECC Encryption and Decryption

    Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    A Proxy Blind Signature Scheme Over Braid Groups

    Proxy signatures, Introduced by Mambo, Usuda and Okamoto, allow a designated person called proxy signer, to sign on behalf of an original signer. According to the delegation type, the proxy signatures are classified as full delegation, partial delegation and delegation by warrant. The proxy signature plays an important role in...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    On Post Decryption Error Probability in Counter Mode Operation with Explicit Counter Transmittal

    Communications channels are prone to errors due to various physical impairments. Although application of error correcting codes overcomes or reduces the impact of these errors, residual errors can pass through undetected in some cases. These residual errors can in turn have significant impact on the transmitted data if it is...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach

    In this paper, the authors propose a new protocol for a scalable multicast key distribution protocol. The proposed protocol is based on Key Management using Boolean Function Minimization (KM-BFM) technique. It is considered one of the best solutions proposed for solving the scalability of multicast security protocols depending on a...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Short Signatures from Difficulty of Factorization Problem

    Public key cryptosystems based on hard mathematical problems are well approved for information authentication with digital signatures. An important practical problem is developing Digital Signature Schemes (DSSes) with short signature length. In general the minimum signature length provided by a DSS depends on the required security level that can be...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Ordered Semiring-Based Trust Establish Model with Risk Evaluating

    Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    The New Block Cipher: BC2

    In this paper, the authors propose a new block cipher called BC2 (Block Cipher 2). They make a cipher using components that are believed secure. The structure of BC2 is very simple. They use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Improving Security Through Analysis of Log Files Intersections

    In today's business environment almost all companies have their computers connected to the public Internet. As the number of companies with computers and services accessible to the Internet increases, a corresponding increase in the number of attacks against these businesses is also observed. Network-based attacks on business computers have been...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Parallel Hardware Architectures for the Cryptographic Tate Pairing

    Pairings play an important role in Identity-Based Encryption (IBE). Such form of cryptography was introduced by Shamir where a public key is derived from public identifiable information such as an e-mail address, and the corresponding private key is created by binding the user identity with a trusted authority's secret key....

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols

    Despite key establishment protocols being the sine qua non of many diverse secure electronic commerce applications, the design of secure key establishment protocols is still notoriously hard. The difficulties associated in obtaining a high level of assurance in the security of almost any new or even existing protocols are well...

    Provided By International Journal of Network Security

  • White Papers // Jul 2010

    Simplified IPSec Protocol Stack for Micro Server

    In this paper, the authors propose a simple IPSec protocol stack for micro server. The authors proposed an implementation of IPSec protocol stack which is constructed by Encapsulating Security Payload (ESP) protocol with Advanced Encryption Security (AES) encryption scheme, whereas authentication using MD5 algorithm is optional. Researchers have focused on...

    Provided By International Journal of Network Security

  • White Papers // Jul 2014

    Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments

    Smart cards have been applied on password authentication in recent years. A user can input their identity and password to require services from the remote server. There are various attacks through an insecure network to obtain a user's information. Therefore, many schemes are proposed to guarantee secure communication. However, a...

    Provided By International Journal of Network Security

  • White Papers // Mar 2014

    "Notes on ""Polynomial - Based Key Management for Secure Intra - Group and Inter - Group Communication"""

    "In 2012, the researcher proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, they point out that there are some security weaknesses of the researcher intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members'...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Network Threat Characterization in Multiple Intrusion Perspectives Using Data Mining Technique

    For effective security incidence response on the network, a reputable approach must be in place at both protected and unprotected region of the network. This is because compromise in the demilitarized zone could be precursor to threat inside the network. The improved complexity of attacks in present times and vulnerability...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

    Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by Certificate Authorities (CAs), The process of getting certificates from a...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Review on IPv6 Security Vulnerability Issues and Mitigation Methods

    One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    A Survey on Distributed Access Control Systems for Web Business Processes

    Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Now-a-days a new paradigm for lightweight integration of business resources has started to hold Business Processes for Web Services. Authorization and access control policies for Web Services protocols and distributed systems are well-studied...

    Provided By International Journal of Network Security

  • White Papers // Nov 2010

    A New Secure Remote User Authentication Scheme with Smart Cards

    Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes are applicable to the areas such as computer networks, wireless networks, remote login systems, operation systems and database management systems. The goal of...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

    Attribute-Based Proxy Re-Encryption (ABPRE) scheme is one of the proxy cryptography, which can delegate the re-encryption capability to the proxy and re-encrypt the encrypted data by using the re-encryption key. ABPRE extending the traditional proxy cryptography and attributes plays an important role. In ABPRE, users are identified by attributes, and...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    Cryptanalysis of NTRU with two Public Keys

    The NTRU public key cryptosystem is a ring-based cryptosystem that was first introduced in the rump session at Crypto'96. It is one of the fastest public-key cryptosystems, offering both encryption (NTRUencrypt) and digital signatures (NTRUSign). It is a relatively new cryptosystem that appears to be more efficient than the current...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    A Fault Based Attack on MDS-AES

    In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2012

    A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies

    In recent years, the information protection for digital contents becomes an important issue for enterprise applications. To protect digital contents, various Enterprise Digital Right Management (E-DRM) schemes have been proposed to prevent the digital contents from illegal accesses. However, the previously related schemes did not support the digital right management...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Improved Fault Attack Against Eta Pairing

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy

    Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the two-party key...

    Provided By International Journal of Network Security

  • White Papers // May 2010

    Using Predicate-based Model Checker for Verifying E-Commerce Protocols

    Over the past decade, researchers have demonstrated that the technique of model checking can be extremely effective when applied to security or E-commerce protocols. Model checking is the process of determining whether a formal model of the analyzed system satisfies a correctness property specified as a temporal logic formula. Model...

    Provided By International Journal of Network Security

  • White Papers // Jun 2012

    A Pairing-free ID-based Key Agreement Protocol with Different PKGs

    In this paper, the authors proposed an identity based key agreement protocol based on Elliptic Curve Cryptography (ECC) between users of different networks with independent Private Key Generations (PKGs). Instead of bilinear pairings which commonly used for contracting identity based schemes, the proposed protocol makes use of elliptic curves to...

    Provided By International Journal of Network Security

  • White Papers // Sep 2012

    A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits

    Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources with the initial access permission. To address this security flaw, Continuous authentication of the...

    Provided By International Journal of Network Security

  • White Papers // Jan 2010

    A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Oct 2007

    Security for Mobile Operators in Practice

    Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. This paper is to publish...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // Aug 2012

    Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-based PKE

    The authors present efficient constructions of Deterministic Encryption (DE) satisfying the new notion - security against privacy adversary (PRIV security), in the random oracle model. Their paper includes: a generic construction of deterministic length-preserving hybrid encryption, which is an improvement over the paper by researcher in crypto'07; to their best...

    Provided By International Journal of Network Security

  • White Papers // Jul 2012

    Cryptanalysis of Multi Prime RSA with Secret Key Greater Than Public Key

    The efficiency of decryption process of multi prime RSA, in which the modulus contains more than two primes, can be speeded up using Chinese Remainder Theorem (CRT). On the other hand, to achieve the same level of security in terms integer factorization problem the length of RSA modulus must be...

    Provided By International Journal of Network Security

  • White Papers // Jul 2012

    On the Security of a RSA-based Certificateless Signature Scheme

    The certificatless cryptography has been studied widely since it could eliminate the need of certificates in the public key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. Recently, a researcher proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in...

    Provided By International Journal of Network Security