Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








54 Hits in 8.5 sec

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment

Wencui Chang, Haifeng Li, Shoulin Yin
2017 Journal of Information Hiding and Multimedia Signal Processing  
To solve this question, we propose a mixed symmetric key and elliptic curve encryption scheme for password authentication and update.  ...  Especially, the above schemes cannot effectively conduct secure password authentication and password update under unstable network environment when user logins remote management.  ...  In this paper, we propose a mixed symmetric key and elliptic curve encryption scheme for password authentication and update.  ... 
dblp:journals/jihmsp/ChangLY17 fatcat:4vevz242qjbt7po7ibvtdrreoq

A Review on Security Issues and Solutions of the Internet of Drones

Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, Jiankun Hu
2022 IEEE Open Journal of the Computer Society  
This review analyzes a host of important security technologies with emphases on authentication techniques and blockchain-powered schemes.  ...  Since security and privacy are among the foremost challenges for the IoD, in this paper we conduct a comprehensive review on security issues and solutions for IoD security, discussing IoD-related security  ...  Many cryptographybased authentication schemes have been proposed for the IoD in the literature. Using elliptic curve cryptography (ECC) and symmetric key primitives, Hussain et al.  ... 
doi:10.1109/ojcs.2022.3183003 fatcat:z23eh64uczbd3eo3uqtn6ec5we

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Chandra Shekhar Yadav, Jagendra Singh, Aruna Yadav, Himansu Sekhar Pattanayak, Ravindra Kumar, Arfat Ahmad Khan, Mohd Anul Haq, Ahmed Alhussen, Sultan Alharby
2022 Electronics  
knowledge regarding keeping hardware and software updated and securing their system with a strong password.  ...  The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology.  ...  The MQTT protocol uses a key policy, whereas MQTT-SN uses an attributebased encryption policy and elliptic curve cryptography to defend MiTM.  ... 
doi:10.3390/electronics11152354 fatcat:saf2a2bb6rdznkbgdukxb3s4fe

Recent Advances and Challenges in Security and Privacy for V2X Communications

Jiaqi Huang, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2020 IEEE Open Journal of Vehicular Technology  
For security, detailed discussions on cryptography based schemes and trust based schemes are provided.  ...  The TA is responsible to preserve all the information of legitimate users, e.g. real ID and location of APs, real ID and reputation scores of OBUs, which will be used to reveal the real identities and  ...  After that, vehicles can encrypt the video using the symmetric key and then transmit the encrypted video to the server.  ... 
doi:10.1109/ojvt.2020.2999885 fatcat:d3ut2edr7jhvvltv6x56snw36u

Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review

Haider Dhia Zubaydi, Pál Varga, Sándor Molnár
2023 Sensors  
platform, consensus algorithm, evaluation environment and metrics, future works or open issues (if any), and further notes for consideration.  ...  While security, anonymity/data privacy, and smart contract-related features are apparently advantageous for blockchain technologies (BCT), there are challenges in relation to storage capacity/scalability  ...  Elliptic Curve Cryptography (ECC) and Physically Unclonable Functions (PUFs) are authentication schemes between system components.  ... 
doi:10.3390/s23020788 pmid:36679582 pmcid:PMC9867322 fatcat:bsmpqomo7vhaxc57uqdcwpqc7a

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
It addresses several key topics, namely vulnerabilities, threats and attacks, proposing a taxonomy for their classification.  ...  It also contains a thorough review of the main concepts concerning the security state of cloud environments and discusses several open research topics.  ...  Acknowledgements We would like to thank all the anonymous reviewers for constructively criticizing this work.  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges

Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Hasan Kahtan, Ashraf Jaradat
2022 Future Internet  
Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things.  ...  The paper also discusses some of the recommendations for reducing the effects of these challenges.  ...  Elliptic Curve Cryptography (ECC) (where cryptographic keys can be generated more efficiently, smaller, and quicker using Elliptic Curve Theory-based PKI), on the other hand, is a significantly lighter  ... 
doi:10.3390/fi14070216 fatcat:7oy6vc3uhfgnlerfr5lcs7qyey

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code.  ...  Meanwhile, this coding scheme also provides good error correction capability for the encrypted information while it is transmitted in a noisy channel.  ...  Until 2001, Boneh and Franklin [5] presented the first practical and provably secure IBE scheme (BF-IBE) using the bilinear pairings on elliptic curves.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

An Empirical Study on System Level Aspects of Internet of Things (IoT)

Narasimha Swamy S, Kota Solomon Raju
2020 IEEE Access  
The authors would also like to thank the P C Panchariya, Director, CSIR-CEERI, Pilani, for his encouragement and constant support.  ...  Acknowledgment The authors would like to thank the Indian National Academy of Engineering (INAE), Gurgaon, and R V College of Engineering (RVCE), Bengaluru, for their financial support.  ...  This protocol, developed using the Elliptical Curve Cryptography (ECC) launches the mutual authentication between the tags and the servers. X.  ... 
doi:10.1109/access.2020.3029847 fatcat:5nprx4xtbjfnnkyibk6vbeg47m

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  In this regard, viewing this technology as a resource for honest parties rather than adversaries, it may enhance not only the security, but also the performance of specific cryptographic schemes.  ...  DSA (Digital Signature Algorithm) and elliptic curve cryptosystems [Alagic et al. 2019 ].  ... 
arXiv:2005.04344v2 fatcat:jstlhwebznfadf5g2zdri4sb6i

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
2019 The Internet of Everything  
protocol to transmit urgent data Abstract: Sensor network is designed to provide monitoring services especially for natural disaster.  ...  Congestion is a very important factor in wireless sensor network (WSN) and also it reduces quality of services.  ...  [39, 40] have designed an identity establishment and capabilitybased access control protocol. This scheme uses elliptical curve cryptography for security.  ... 
doi:10.1515/9783110628517-fm fatcat:3npfgq3o65f5pdbphf6pi4qn3a

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
2022 figshare.com  
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images  ...  keys for authentication.  ...  Secure and privacy preserving keyword search Qin Liu et.al. [1] proposed a secure and privacy-preserving keyword search over the encrypted data for cloud storage applications using Elliptic Curve Cryptography  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch, Bjorn Scheuermann
2016 IEEE Communications Surveys and Tutorials  
As we show and discuss, many key ideas are likewise applicable in various other fields, so that their impact reaches far beyond Bitcoin itself.  ...  In this survey, we unroll and structure the manyfold results and research directions. We start by introducing the Bitcoin protocol and its building blocks.  ...  The authors would like to thank Daniel Cagara for the discussions on this topic and for sharing his practical experience.  ... 
doi:10.1109/comst.2016.2535718 fatcat:xmdaafdgsvc6tam2kzmaeyorta

BIOSIG 2020 - Komplettband

2020 Biometrics and Electronic Signatures  
However, the pandemic led to the wide use of face masks, essential to keep the pandemic under control.  ...  The effect of wearing a mask on face recognition in a collaborative environment is currently sensitive yet understudied issue.  ...  We thank the reviewers for their comments, the authors in [MSK06] for providing us with their codes for reconstructing faces, and NCI Australia for computational resources.  ... 
dblp:conf/biosig/X20 fatcat:hkqvegujqbatdlopbzclkxdive

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
In performance analysis, it is observed that the Zone Routing Protocol (ZRP) out-performs the other MANET routing protocols in terms of network performance and security for the proposed scheme.  ...  In post-quantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification , authentication, distance bounding and tag with ownership transfer protocols  ...  Acknowledgments This study was supported by the Asia University, under grant No. 98-NSC-02 and 101-ASIA-34. The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
« Previous Showing results 1 — 15 out of 54 results