Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • White Papers // Apr 2012

    Two Non-interactive Key Agreement Protocols under Certificateless Scenarios

    Key agreement protocol is one of the fundamental primitives of cryptography. It allows two or more parties to establish secret keys securely in the presence of an eavesdropping adversary. In this paper, two certificates-less non-interactive key agreement protocols were proposed under certificate-less scenarios, which have obvious advantages in the amount...

    Provided By AICIT

  • White Papers // Dec 2012

    Analysis on Grid Security Patterns Based on PKI

    Grid computing is a newly developed technology; it connects distributed computer, networks, database and research facilities together with high speed network. Because of the mass data and the dynamic attributes the grid possesses, security environment of open grid must be taken into serious consideration. Definition of security patterns have been...

    Provided By AICIT

  • White Papers // Nov 2012

    Hierarchical Identity-Based Key Management in Cloud Computing

    The authors present a hierarchical identity-based signcryption key management scheme in cloud computing. Their solution adopts identity-based signcryption technology. Identity-based signcryption not only provides privacy protection and unforgeability but also is more efficient manner than a composition of an encryption scheme with a signature scheme. The identity of entities which...

    Provided By AICIT

  • White Papers // Nov 2012

    A Digital Signature Algorithm in Information and Network Security Based on Discrete Logarithm and Hash Functions

    The digital signature technology is an important technology for identification in a virtual environment for network systems. Digital signatures can be used to verify the document's authenticity, integrity and non-repudiation of information security research. The discrete logarithm problem is the large number of cryptographic protocols based on cryptography. Hash function...

    Provided By AICIT

  • White Papers // Aug 2012

    Advanced Smart Card Based Password Authentication with User Anonymity

    Recently, smart card based password authentication was widely used for the remote user authentication for insecure communication. However, most existing smart card based password authentication schemes are vulnerable to physical or internal attack. In addition, the compromise of user's identity would lead to the tracing of the previous network communications...

    Provided By AICIT

  • White Papers // Mar 2009

    Sub-Connection Based Isolation Against Network Virus

    Taking the superiority of the connection of the network, computer viruses bring more harm to users. However few researches focus on the network isolation against virus. Most existing isolation tools trying to isolate the faults and protecting the specific sub-network do not fit to prevent web-spreading network virus. By dividing...

    Provided By AICIT

  • White Papers // Dec 2013

    Mobile Malware Detection Using Correlational Analysis

    Currently, most of the Smartphone's use the method of the existing anti-virus program on the user's PC, such as the signature-based pattern matching techniques to detect the malicious code. When a new attack appears, this method cannot be detected before the attack signature updates. In addition, the performance problems act...

    Provided By AICIT

  • White Papers // Jul 2012

    Estimating the Size of P2P Botnets

    In recent years, botnets have become a threat to internet security. Attackers can control a large number of computers to launch various types of attacks. Botnet size is vital to assessing the threat posed by botnets since a larger botnet poses a greater threat. This paper proposes a method for...

    Provided By AICIT

  • White Papers // Nov 2013

    An End-to-End ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks

    Short Message Service (SMS) is the most common text messaging service available on handheld devices. However, there is no any form of encryption or message integrity checking on the SMS message whilst traversing the GSM backbone. Also there is no mutual authentication between the MS and the BTS, and there...

    Provided By AICIT

  • White Papers // Feb 2013

    A New Two-Factor Dynamic ID-Based Remote User Authentication Scheme

    Password authentication has been adopted as one of the most popular solutions in protecting network environment resources from unauthorized access. Most password authentication schemes are unfavorable for many applications because they are based on static IDs, which an attacker can use to trace and identify a user's requests. This paper...

    Provided By AICIT

  • White Papers // Apr 2013

    An Efficient Authentication Scheme with Forward Security for STB-Based DTV

    In this paper, the authors present investigations on the smart card-based secure protocol for user-STB authentication and session key establishment in DTV system. It also introduces sub-session key mechanism to improve the efficiency of restart. The proposed secure protocol has features of bidirectional authentication, session key secrecy, session key confirmation,...

    Provided By AICIT

  • White Papers // Jan 2013

    Cryptanalysis and Improvement of a Remote User Authentication Scheme Based on Dynamic ID Using Smart Card

    With the development of computer network, how to identify the legality of the remote user identity information over an insecure channel has been becoming an important problem. In this paper, through analyzing a remote user authentication scheme proposed by the researcher's scheme, the authors find that it still has some...

    Provided By AICIT

  • White Papers // Dec 2011

    Computer Security Economics Based on Risk Analysis of Multilevel Authentication Design for Access Control

    Several password techniques for multilevel authentication mechanism in the development of secondary password are presented. These include user-selected passwords, system-generated passwords, passphrases, cognitive passwords, and associative passwords. A comparative evaluation on the users' memorability and users' subjective preferences for those various password mechanisms was conducted. The Return On Investment (ROI)...

    Provided By AICIT

  • White Papers // Jun 2012

    Cryptanalysis and Improvement of a YS-Like User Authentication Scheme

    Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Recently, the researcher has proposed a YS-like user authentication scheme using smart cards. They claimed that their scheme can prevent various attacks. Unfortunately,...

    Provided By AICIT

  • White Papers // Apr 2013

    Smartcard-Based Remote Authentication Scheme Preserving User Anonymity

    Since Lamport designed the authentication scheme, remote user authentication methods has been continuously developed on the basic of the various researches. Recently the study providing user's anonymity on communications channel has been carried out actively for privacy protection. In 2009, the researcher suggested the authentication scheme by smart card that...

    Provided By AICIT

  • White Papers // Apr 2012

    Maximum Life-Time Broadcast Authentication Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of ultra-small, low-cost, low power autonomous sensor nodes. WSNs can be used for wide range of applications. Security is a critical issue when sensor networks are deployed in a hostile environment where they are exposed to a variety of malicious attacks....

    Provided By AICIT

  • White Papers // Mar 2011

    Security Analysis of a Privacy-Preserving ECC-Based Grouping-Proof Protocol

    The researcher has proposed a privacy-preserving grouping-proof RFID protocol with Colluding Tag Prevention (CTP) recently which relies exclusively on the use of Elliptic Curve Cryptography (ECC). In this paper, the authors show that this proposed protocol is not secure against the tracking attack. To make this attack successfully, the adversary...

    Provided By AICIT

  • White Papers // Feb 2013

    A Dynamic-Key Authentication Scheme Based on Synchronization of Spatiotemporal Chaos

    The existing authentication schemes are based on fixed keys and the key renewal is relatively complex. In order to solve the security issues of the fixed key during the long-term use, an in-depth research of spatiotemporal chaos and its synchronization features is made by this paper, and a dynamic-key authentication...

    Provided By AICIT

  • White Papers // May 2013

    A Review on the Graphical User Authentication Algorithm: Recognition-based and Recall-based

    In recent years, computer and network security have been described as a frightening and dangerous place with attackers, hackers, spammers and scammers all at work. The bulk of web users are usually authenticated using a password. User authentication has become an important consideration in information security as traditional password-based schemes...

    Provided By AICIT

  • White Papers // Jul 2013

    User Behavior Based Authentication on Mobile Network

    Mobile networks offer attractive flexibility and coverage to network operators and users. As the mobile communications systems have evolved, successive improvements have not been addressed with security and privacy in mind because of their small size, memory capability, and the case with which information can be downloaded and removed from...

    Provided By AICIT

  • White Papers // Oct 2012

    Robust Improved Mutual Authentication Scheme in Multi-Hop Network

    Security support is mandatory for any communication networks. This paper proposed an improved Mutual Authentication Scheme in Multi-Hop Network, firstly, the algorithms method revised X.509 certificate based on ECC algorithm, then an enhanced mutual authentication flow was presented, which enhances the security and working efficiency of the mutual authentication in...

    Provided By AICIT

  • White Papers // Aug 2012

    An Improved Hand-off Algorithm Based on Roaming Authentication Scheme

    This key technique is to solve the issue of mutual trust establishment between different PKI domains in the future wireless network development for clients. Without Certificate Authority (CA), by adopting threshold scheme, a new roaming hand-off authentication scheme between the different trusted domains in multi-hop wireless network is proposed, then...

    Provided By AICIT

  • White Papers // Sep 2012

    Efficient and Secure RFID Mutual Authentication Protocol without Sharing Key

    Many RFID authentication protocols have been proposed in recent years. However, most existing protocols have a common problem that in order to identify only one single tag they require a linear computational complexity on the back-end server side. This problem makes use of the protocols impractical in large-scale RFID systems....

    Provided By AICIT

  • White Papers // Mar 2012

    An Efficient RFID Authentication Protocol Supporting Tag Ownership Transfer

    Radio Frequency IDentification (RFID) is a technology which is used to identify remote objects embedded with RFID tags by wireless scanning without manual intervention. Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual...

    Provided By AICIT

  • White Papers // Jan 2013

    A Low-Cost and Light-Weight Approach to Privacy RFID Mutual Authentication Protocol

    Widespread deployment of Radio-Frequency IDentification (RFID) technologies may generate new threats to security and user privacy. The design of light-weight authentication protocols that conform to low-cost tag requirements is imperative. To analyze the security weakness of the one-way reader-to-tag, authentication scheme is proposed by EPCglobal Class-1 Generation-2 (C1G2) RFID protocol,...

    Provided By AICIT

  • White Papers // Oct 2011

    An Efficient Lightweight RFID Authentication Protocol for Low-Cost Tags

    Wireless communication; signal broadcasting, strictly limited resources in tags make RFID systems being confronted with many security attacks and privacy disclosure threats. In this paper, an efficient lightweight RFID mutual authentication protocol is proposed, this protocol only requires O (1) work to identify and authenticate a tag in the backend...

    Provided By AICIT

  • White Papers // Oct 2013

    Verification of an Authentication Protocol for M2M Communication Signal Processing

    With the advancement of RFID/USN system technology, M2M (Machine-To-Machine) communication draws attention as a promising future industry. M2M communication is intended for inter-machine communication especially in a space hardly accessible to humans in such fields as disaster, safety, construction, health and welfare, weather, environment, logistics, national defense, medical care and...

    Provided By AICIT

  • White Papers // Jul 2013

    On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks

    Mobile satellite services refer to networks of communications satellites intended for use with mobile and portable wireless telephones. Low Earth Orbit (LEO) satellites provide low end-to-end delays and efficient frequency spectrum utilization, making them suitable for personal mobile communication. Recently, a simple and anonymous authentication scheme for mobile LEO satellite...

    Provided By AICIT

  • White Papers // Feb 2013

    Inter-Domain Anonymous Authentication in Wireless Mesh Networks

    Anonymity has received increasing attention in academia and industry due to the user's awareness of their privacy now-a-days. In this paper, the authors take the privacy issue into consideration within Wireless Mesh Networks (WMNs). To support the authorized access in wireless mesh networks, they propose a ticket-based inter-domain anonymous authentication...

    Provided By AICIT

  • White Papers // Feb 2014

    Authentication Indicators Based Bio-Detection Function with Text-Based CAPTCHA

    Currently, it is unavoidable of typing CAPTCHA (Completely Automated Public Turing test to tell Computer and Human Apart) before accessing to the Internet. This technique mostly can distinguish bots from human being. Thus, the system is protected from any unwanted persons or programs. There are various researches proposed several of...

    Provided By AICIT

  • White Papers // Oct 2011

    An IKEv2 Based Security Authentication Scheme for Mobile Network

    As an extension of Mobile IPv6, NEtwork MObility (NEMO) was introduced by IETF in 2005. It allows session continuity for every node in the Mobile Network as the network moves. It also allows every node in the Mobile Network to be reachable while moving around. However, in the NEMO basic...

    Provided By AICIT

  • White Papers // Jun 2011

    RSA Authentication Algorithm Based on Euclid Addition Chains and Its Application in Enterprise OA Systems

    RSA based authentication algorithm is discussed in detail, as well as addition chains algorithm and Euclid principle are discussed thoroughly. Then a new addition chains algorithm based on Euclid for modular exponentiation in RSA algorithm is proposed. The new Euclid addition chains algorithm translates the exponent of private key and...

    Provided By AICIT

  • White Papers // Jun 2013

    A Secure Network for Mobile Wireless Service

    The mobile wireless network is becoming more and more popular now-a-days. The authors are especially interested in a special kind of wireless network-an ad hoc network. As demonstrated in, an ad hoc network has its advantages and they will demonstrate that it is suitable for network applications with security requirements...

    Provided By KIPS

  • White Papers // Mar 2011

    Security Framework for RFID-Based Applications in Smart Home Environment

    The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. The authors can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection...

    Provided By KIPS

  • White Papers // Mar 2011

    Ensuring Anonymity for LBSs in Smartphone Environment

    With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those Smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's...

    Provided By KIPS

  • White Papers // Mar 2011

    Handling Malicious Flooding Attacks Through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

    Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as...

    Provided By KIPS

  • White Papers // Mar 2011

    Guess and Determine Attack on Bivium

    Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits. In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best...

    Provided By KIPS

  • White Papers // Mar 2011

    Generic Constructions for Strong Designated Verifier Signature

    A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer...

    Provided By KIPS

  • White Papers // Mar 2011

    Virus Detection Method based on Behavior Resource Tree

    Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper...

    Provided By KIPS

  • White Papers // Dec 2011

    A Survey of RFID Deployment and Security Issues

    This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed...

    Provided By KIPS