Security
Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.
-
Slicing Technique For Privacy Preserving Data Publishing
Privacy-preserving data mining is the area of data mining that used to safeguard sensitive information from unsanctioned disclosure .The problem of privacy-preserving data mining has become more important in recent years because of the increasing ability to store personal data about users. A number of techniques such as randomization and...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Secure Web Mining Framework for e-Commerce Websites
In this paper, the authors deal with e-commerce website and shows the usage of web mining technology to provide security for e-commerce websites. User behavior on the web is based on web mining, security and e-commerce. Customer behavior pattern is analyzed to improve e-commerce websites. Different web mining algorithm and...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Review of Transactions on Illuminated Facial Image Preprocessing for User Authentication
In this paper, the authors mainly deal with improving the performance of face detection security system by removing the two most important factors that is illumination and reflectance which hamper detection or reorganization. The problem in 2D face verification system is poor illumination condition which causes variation in facial image...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Diverse techniques including watermarking, steganography, and cryptography have been introduced...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Reviewing Effectiveness of CAPTCHA
The massive use of the Internet and WWW by the government and commercial organizations for automation of work has resulted in extensive proliferation of online computing. To avoid online forms being filled by bots or malicious computers the form designers usually use a cryptic image known as CAPTHA (Completely Automated...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Implementation Opass Authentication Protocol System for Net Security
Safety may be a major focus of awareness for operators and users of the web site and its several applications, among the tough issues still inefficiently self-addressed is identity authentication for functions of associating specific user with particular services and authorizations. Asking may be thanks to classify users such shaping...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Wireless LAN Security: Addressing Challenges, Attacks and Solutions
With tremendous growth and advancement in wireless technology and excessive use of internet in all the applications, security has become one of the most crucial and most demanding factors in wireless LAN, no matter if it is an individual, home or a business network. Regardless of different benefits of wireless...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Entrenched Visual Cryptography Using Secret Sharing Scheme with Public Key
Visual Cryptography Scheme (VCS) is a cryptography technique which allow visual data i.e.: printed text, handwritten notes, and picture is encrypted in such a way that the decryption can be done by the human visual system, without the support of computers. In order to share undisclosed images VCS used as...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Intrusion Detection in Computer Network Using Genetic Algorithm Approach: A Survey
The intrusion detection problem is becoming a challenging task due to the proliferation of heterogeneous computer networks since the increased connectivity of computer systems gives greater access to outsiders and makes it easier for intruders to avoid identification. Intrusion detection systems are used to detect unauthorized access to a computer...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Detection of Anomalies From Dataset Using Distributed Methods
Detection of anomalies has been an ergonomic way to attention in many application and research area. This paper includes with the detection of network intrusion, malware detection, biological data, image processing etc. The related researches were based on pair wise distance among all points in dataset. This approach is based...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
I-FOO: An Enhancement to FOO Protocol
Various e-voting protocols have been proposed by researchers, while a few numbers of them are suitable to be implemented and utilized as an Internet-voting schema. Among these protocols, the FOO Error! Reference source not found. Protocol has been implemented and utilized for several factors, due to simplicity and collusion resistance...
Provided By Shahara D. Wright
-
An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval From Large Database
Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristics. In a biometric identification system, the identity corresponding to the input data (probe/investigation) is typically determined by comparing it against the templates of all identities in a database...
Provided By Creative Commons
-
Safekeeping of Network Executive for a Domestic Internet Service Provider
A net is one of the most important basic resources a large institution needs to have. Today, a network plays a very important role in every group. With extensive dispersed positioning, supervision the security of a network becomes very complex especially from the viewpoint of an ISP. ISP's are by...
Provided By Creative Commons
-
Detection of Malicious Url Redirection and Distribution
Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...
Provided By Creative Commons
-
Hierarchical EAP Back-End Authenticator State Machine
Authentication is a basic requirement for telecommunication network market for allowing resources to the legitimate users. Extended Authentication Protocol (EAP) is a widely used protocol for authentication. EAP is basically a framework which supports several authentication methods. The several authentication methods supported by a single protocol make this protocol a...
Provided By Creative Commons
-
Computer Virus: Their Problems & Major Attacks in Real Life
Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers...
Provided By Creative Commons
-
Review of First Hop Redundancy Protocol and Their Functionalities
In this paper, the authors are focusing on data link layer protocols. First, when designing a network, one of the most important things to focus on when is designing a network on how to deal with failure. A major part of this research is trying to explore First Hop Redundancy...
Provided By Creative Commons
-
A Novel Approach for Detection and Prevention of Wormhole Attack in Ad-Hoc Networks
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper, the authors specifically considering tunnelling attack which does not require exploiting any nodes in the network and can interfere with the route establishment process. Wormhole attack is a network layer attack...
Provided By Creative Commons
-
Mitigating DoS Attack in VPN
VPN provides confidentiality, integrity and availability through tunneling and encryption. Protocols used in VPN provide various security features but it does not provide any protection against Denial of Service (DoS) attack. DoS attacks to VPN represent a serious threat to organizations using Internet for communication. It also barricades the services...
Provided By Creative Commons
-
Detection of Various Attacks in Wireless Sensor Networks Using Zero Knowledge Protocol
Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Wireless Networking Security ("Secured-Nim": Blocking Misbehaving Users In Anonymizing Networks)
Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Intrusion Detection System (A Layered Based Approach for Finding Attacks)
Now-a-days the number of computer networks keeps growing in parallel with transactions, especially on the Internet while streaming, video conferencing, chatting, searching, etc. This paper titled "Intrusion Detection System, a layered based approach for finding attacks" is an OSI layered based network Intrusion Detection System (IDS) proposed. Here the authors...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Study of MANET: Characteristics, Challenges, Application and Security Attacks
Mobile Ad-hoc NETworks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. Due to its fundamental characteristics, such as wireless medium, dynamic topology, distributed cooperation, MANETs is vulnerable to various kinds of security...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Enhanced Amalgam Encryption Approach for Grid Security
Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Anomaly detection in RDBMS
Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Porting the Linux Kernel to Arm System-On-Chip And Implementation of RFID Based Security System Using ARM
In this paper, the authors emphasize on porting the Linux kernel to an ARM board and thus implementing the RFID (Radio Frequency IDentification) based security system using the ARM board. ARM System-On-Chip is the best platform for reducing the risk and the cost of SOC designs and thus accelerating the...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Malware Classification based on Clustering and classification
Malware, short for malicious software, means a variety of forms of hostile, intrusive, or annoying software or program code. Malware is a pervasive problem in distributed computer and network systems. Malware variants often have distinct byte level representations while in principal belong to the same family of malware. The byte...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
FPGA Implementation of Cryptographic Algorithms using Multi-Encryption Technique
As internet is in enormous demand and it acts as a repository for the data and knowledge, there is unremitting demand for real time implementation of cryptographic algorithms so that one can secure its data over this decentralized network and help in preserving the security of the system. The Importance...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Biometrics and Face Recognition Techniques
Biometrics is a growing technology, which has been widely used in forensics, secured access and prison security. A biometric system is fundamentally a pattern recognition system that recognizes a person by determining the authentication by using his different biological features i.e. Fingerprint, retina-scan, iris scan, hand geometry, and face recognition...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Breaking Cryptosystem's through Cache Based Timing Side Channel Attack
A new class of physical attacks against cryptographic modules, called as Side-Channel Attacks (SCA) is a powerful technique to reveal secret keys of cryptographic devices. SCA tries to exploit specific properties of the implementation, operating environment such as timing, power or electro-magnetic analysis of a cryptosystem. This paper presents the...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Phishing & Anti-Phishing Techniques: Case Study
Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate and even the Web pages where users are asked to enter their information may look real. Phishing is similar to fishing in a lake, but instead of trying...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Improving System Protection and Performance in The Tor System End-To-End Tunable Path Selection
Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both ore secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Neural Cryptography for Secret Key Exchange and Encryption with AES
Cryptography is the art of mangling information into apparent unintelligibility in a manner allowing a secret method of unmangling. The basic service provided by cryptography is the ability to send information between participants in a way that prevents others from reading it. In order to protect the content against an...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Securing Data by Using Cryptography with Steganography
Securing data is a challenging issue in today's era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Novel Approach for Securing Biometric Template
Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication links among them. Securing templates from these attacks have become very important or imperative issue. Security is achieved by methods of cryptography, which...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Review Paper on Pooled Black Hole Attack in MANET
Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are launched by participating malicious nodes against different network services. Ad hoc On-demand Distance Vector routing (AODV) is a broadly accepted network routing protocol for Mobile Ad-hoc...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Security Protocols Against Cyber Attacks Using SMS Alert
Cybercrime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Cybercrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime has become high-profile. On...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Enhancement of Biometric Template Security in Multibiometric Systems
Security is a very important aspect in the biometric systems. Biometric characteristics are unique to an individual hence the compromise of the biometric template is permanent. Attackers mostly attack on template and database of biometric system so securing them is a very crucial issue these days. Moreover the multi-biometric systems...
Provided By Lovely Professional University
-
Towards a Perspective of Web Application Vulnerabilities and Security Threats
The rapid and tremendous growth of Information and Communication Technology (ICT) has increased access to web applications. This increased access has paved the way for disadvantageous security and vulnerable threats in the form of attacks in web applications. Various detection and prevention techniques have been proposed by researchers in the...
Provided By International Journal of Computer Science and Telecommunications
-
An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (DOS) Attack Model
This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS) attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as...
Provided By Engg Journals Publications
-
A Dynamic ID-Based Remote User Authentication Scheme
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to...
Provided By Ministry of Communications and Information Technology
-
Staying Ahead of Threats With John Pescatore
The presenter of this webcast gives insights on how IT security practices must evolve to mitigate the risks posed by today's prolific threat environment.
Provided By Core Security
-
Completing Your IS Program With CyberSecurity Insurance
The attendee of this webcast will see how CyberSecurity by Chubb can complete the information security program by picking up where IT defenses and internal security policies leave off.
Provided By Core Security
-
5 Key Gaps in Cyber Security
The attendee of this webcast will learn about the 5 key gaps in cyber security that hackers are able to consistently and repeatedly exploit.
Provided By Core Security
-
Application Security Lessons From the Field With Core Security Consulting Services
This webcast throws light on the application security. The presenter of this webcast shares lessons learned during extensive field work in application security testing.
Provided By Core Security
-
Intrusion Detection In-Depth
The presenter of this webcast will provide practical tips for getting the most out of the intrusion detection and prevention investments through security testing.
Provided By Core Security
-
Plugged In: Meeting NERC Security and Compliance Demands
The presenter of this webcast throws light on security and compliance requirements as handed down by the North American Electric Reliability Council (NERC) in its Critical Infrastructure Protection (CIP) standard.
Provided By Core Security
-
Aligning Your Agency With FISMA and NIST Via Proactive Security Testing
The presenter of this webcast discusses on the implications of NIST 800-53a and the larger benefits of proactive security testing. The presenter will outline the specific NIST testing requirements and discuss how automated security testing solutions can enable government agencies to both accelerate their assessments and prove due diligence to...
Provided By Core Security
-
Maintaining PCI Compliance: A View From the Top
The presenter of this webcast provides an overview of the PCI DSS, discusses recent modifications to the Standard, and offers clarifications on the penetration testing requirement.
Provided By Core Security
-
Security Testing: The Easiest Part of PCI Certification
The attendee of this webcast will find out how the right security testing practices can help to prevent card member data breaches and address multiple PCI requirements.
Provided By Core Security
-
Replicating the Gonzalez Cyber Attacks Through Penetration Testing
The attendee of this webcast will learn how commercial-grade penetration testing software enables to see the IT systems as an attacker would.
Provided By Core Security
-
Comprehensive Penetration Testing With CORE IMPACT Pro
The attendee of this webcast will see how easily and safely CORE IMPACT Pro can evaluate the information security risks. The presenter demonstrates CORE IMPACT Pro's capabilities.
Provided By Core Security
-
A Hybrid Framework to Analyze Web and OS Malware
Malicious programs (malware) cause serious security issues to home users and even to highly secured enterprise systems. The main infection vector currently used by attackers is the Internet. To improve the detection rate and to develop protection mechanisms, it is very important to analyze and study these threats. To this...
Provided By University of Camerino
-
Mutation Analysis for Security
Security has become, now-a-days, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives....
Provided By University Mohammed V Souissi
-
Identification Based Encryption With RSA-OAEP Using SEM and Without
In this paper, the authors show how they can integrate the RSA (RSA-OAEP) into the IBE. Their prove can be make with either Standard Model or Random Oracle. They firstly develop the basic ideas made in this direction, so that to create a novel scheme with which they can signs...
Provided By University Mohammed V Souissi
-
Verme: Worm Containment in Overlay Networks
Topological worms, such as those that propagate by following links in an overlay network, have the potential to spread faster than traditional random scanning worms because they have knowledge of a subset of the overlay nodes, and choose these nodes to propagate themselves; and also because they can avoid traditional...
Provided By Technical University of Kosice
-
Analysis Of The Results Of Audits Of Quality Management System-Sales Service Of Cars
Mission of the "Quality, Innovation, Prosperity" journal is to dispense updated, original and by the editorial board reviewed scientific articles on the quality of work, production and life from any social domains intended for ambitious professionals, academic public and for both graduated and undergraduate students. The journal principal content will...
Provided By Technical University of Kosice
-
Newly Structured Router Network Architecture Using Cloud Control Plane and Forwarding Plane
This paper proposes a novel network architecture called cloud control plane (Cloud C-plane) to reduce the power consumption of networks. In Cloud C-plane, the forwarding functions and control functions are decoupled, and the control functions are placed in the cloud. In addition, physical network topology is modified to improve the...
Provided By Keio University
-
Security for Micro Server
In recent years, the applications of ubiquitous sensors have become very important in the real world. However, it is dangerous if security crackers can access to the sensor nodes or micro servers because they can attack them. Therefore, the minimum security is needed in the ubiquitous sensor networks. Researchers have...
Provided By Keio University
-
Political Economy Of Public Capital Formation In Japan
This paper investigates public investment policy (mainly from the 1980s onwards) with a political-economic approach. The points of this paper are as follows. First, at the macro level, it is possible that the short-term fluctuation of public investment has been controlled by the government party's political incentive to win an...
Provided By Keio University
-
Technology as a Need: Trends in the Evolving Information Society
In this paper, the authors take a broad view on the Information Society and on the Information and Communication Technologies which constitute its technical and, in a sense, social infrastructure. They discuss the fact that today the needs of human beings are strongly influenced by technology, which has become a...
Provided By Poznan University of Economics
-
Securing the Organization: Creating a Partnership Between HR and Information Security
Securing infrastructure is one of the most critical issues facing business and governments today worldwide, as it becomes conventional wisdom that the health of the collective cyber community is vital to the growth and stability of the global economy. As an outgrowth of that realization, it is becoming widely accepted...
Provided By International Information Systems Security Certification Consortium
-
PCI Policy Compliance Using Information Security Policies Made Easy
Many organizations are building or updating written information security policies in response to the newly updated Payment Card Industry Data Security Standard (PCI-DSS). Written information security policies are fundamental to an effective information security program and required for compliance with many frameworks and regulations, including PCI, HIPAA, COBIT and many...
Provided By Information Shield
-
Least Squares Disclosure Attacks: User Profiling for Mix-Based Anonymous Communication Systems
Mixes, relaying routers that hide the relation between incoming and outgoing messages, are the main building block of high-latency anonymous communication systems. A number of so-called Disclosure Attacks have been proposed that effectively de-anonymize traffic sent through these systems. Yet, the dependence of their success on the system parameters is...
Provided By University of Vienna
-
Weber's Law-Based Side-Informed Data Hiding
Although a lot of attention has been typically paid to the performance of data hiding methods in terms of capacity, probability of decoding error, probability of detection, robustness, detectability (from a steganographic point of view), and more recently to their security, it is clear that the perceptual impact of the...
Provided By University of Vienna
-
Witsenhausen's Counterexample and Its Links with Multimedia Security Problems
Witsenhausen's counterexample was proposed more than four decades ago in order to show that affine control strategies are not optimal for systems with non-classical information patterns. Finding the optimal solution to Witsenhausen's problem however remains an open problem. Recently, the stochastic control community has re-discovered Costa's Dirty Paper result as...
Provided By University of Vienna
-
Asymptotically Optimum Universal Watermark Embedding and Detection in the High SNR Regime
In this paper, the authors derive the false negative error exponent for any given embedding strategy and use such a result to show that in general the optimum embedding rule depends on the variance of the host sequence and the variance of the attack noise. They then focus on high...
Provided By University of Vienna
-
Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering
Quantization-based methods, such as Dither Modulation (DM), have gained wide acceptance due to their host rejection capabilities which afford significant performance gains over spread-spectrum-based methods in additive white Gaussian channels. Unfortunately, existing quantization-based schemes are not robust against simple Linear-Time-Invariant (LTI) filtering, which is a common operation with multimedia signals....
Provided By University of Vienna
-
E-Mail Classification for Phishing Defense
Authors discuss a classification-based approach for filtering phishing messages in an e-mail stream. Upon arrival, various features of every e-mail are extracted. This forms the basis of a classification process which detects potentially harmful phishing messages. Authors introduce various new features for identifying phishing e-mail and rank established as well...
Provided By University of Vienna
-
Quality Based Rank-Level Fusion in Multibiometric Systems
Multibiometric systems fuse evidences from multiple biometric sources typically resulting in better recognition accuracy. These systems can consolidate information at various levels. For systems operating in the identification mode, rank level fusion presents a viable option. In this paper, several simple but powerful modifications are suggested to enhance the performance...
Provided By Cairo University
-
Political Profit And The Invention Of Modern Currency
The Massachusetts currency of 1690 was the first inconvertible paper money to be supported solely by a legal tender law. The circumstances that led to its creation exceed the typical story of wartime specie shortage. Due to temporary political constraints of that turbulent period, the currency could be neither backed...
Provided By Bar - Ilan University
-
War And Terrorism Insurance: Plans For Long-Term International Stability And Affordability
Insurers in the most exposed classes of business, who were entitled to cancel cover for such risks at short notice, began to do so. Reinstatement, when available, was obtainable only for reduced cover at increased rates. Fresh capital, unencumbered by prior losses, emerged to surf new premium opportunities. Governments were...
Provided By International Association for the Study of Insurance Economics
-
Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns
This paper presents a hand vein authentication system using fast spatial correlation of hand vein patterns. In order to evaluate the system performance, a prototype was designed and a dataset of 50 persons of different ages above 16 and of different gender, each has 10 images per person was acquired...
Provided By Cairo University
-
Constructing Optimal Authentication Codes With Perfect Multi-Fold Secrecy
Authentication and secrecy are two crucial concepts in cryptography and information security. Although independent in their nature, various scenarios require that both aspects hold simultaneously. For information-theoretic or unconditional security (i.e. robustness against an attacker that has unlimited computational resources), authentication and secrecy codes have been investigated for quite some...
Provided By Universitat Tubingen
-
Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. The authors use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle...
Provided By Universite de Pau et des Pays de l'Adour
-
Resource-Restricted Indifferentiability
The notion of indifferentiability was introduced and tailored for security analysis of hash function constructions, making indifferentiability from a random oracle the desired property for any hash function design. However, the widely accepted view that a construction enjoying such a proof with an underlying ideal compression function can replace the...
Provided By Comenius University
-
Threshold Encryption Into Multiple Ciphertexts
The authors propose (T,N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption of the original message from any ciphertext. Moreover, knowing T + 1 ciphertexts allows efficient recovery of the original message without the key (and...
Provided By Comenius University
-
Attacking M&M Collective Signature Scheme
A collective signature scheme aims to solve the problem of signing a message by multiple signers. Recently, Moldovyan and Moldovyan proposed a scheme for collective signatures based on Schnorr signatures. The authors show some security weaknesses of the scheme. Digital signature schemes are important cryptographic constructions with wide and diverse...
Provided By Comenius University
-
On Designated Verifier Signature Schemes
Designated verifier signature schemes allow a signer to convince only the designated verifier that a signed message is authentic. The authors define attack models on the unforgeability property of such schemes and analyze relationships among the models. They show that the no-message model, where an adversary is given only public...
Provided By Comenius University
-
Combining Properties of Cryptographic Hash Functions
A "Strong" cryptographic hash function suitable for practical applications should simultaneously satisfy many security properties, like pseudo-randomness, collision resistance and unforgeability. This paper shows how to combine two hash function families each satisfying different security property into one hash function family, which satisfies both properties. In particular, given two hash...
Provided By Comenius University