A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Face Security Authentication System Based on Deep Learning and Homomorphic Encryption
2022
Security and Communication Networks
To solve this problem, a face feature ciphertext authentication scheme based on homomorphic encryption is proposed. ...
Finally, the integrity and consistency of face feature ciphertext recognition results before and after decryption are guaranteed by the one-time MAC authentication method. ...
greatly improves the efficiency and flexibility of calculation; (2) the one-time MAC authentication method is directly utilized on the server, removing the trusted center for authentication. is scheme ...
doi:10.1155/2022/7752292
fatcat:25ktss2nw5e7dng7a3sigyupxi
Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks
2018
International Journal of Online Engineering (iJOE)
Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. ...
The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication. ...
The homomorphic signature scheme is also improved. ...
doi:10.3991/ijoe.v14i08.9181
fatcat:n36nf3eic5dvtmxnf2tpxdueau
Towards authenticated network coding for named data networking
2017
2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
coding scheme tailored for named data networking. ...
We also propose an optimized authentication model based on homomorphic encryption to deal with the "pollution attacks" problem in which malicious nodes can flood the network with bad packets and prevent ...
In Section II, we describe our optimization coding and homomorphic security model for network coding system and we present the construction satisfying our network architecture. ...
doi:10.23919/softcom.2017.8115565
dblp:conf/softcom/BoussahaCBB17
fatcat:clg4v2l23nadzivki646ordwwa
On security against pollution attacks in network coding enabled 5G networks
2020
IEEE Access
The survey goes a step further and includes a potential secure implementation of network coding enabled 5G networks, based on cooperating small cells. ...
Network coding is arising once more as an enabler for satisfying the bandwidth requirements of future multimedia and resource hungry services. ...
Homomorphic cryptographic schemes are again classified into homomorphic signature schemes and homomorphic message authentication codes (MACs). ...
doi:10.1109/access.2020.2975761
fatcat:vaz7xqagbrhatino4a3kuytaxu
An Unconditionally Secure Authentication Code For Multi-Source Network Coding
2012
International Journal of Wireless and Microwave Technologies
In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. ...
For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity ...
Since the research of multi-source network coding was studied fewer, our scheme about the security analysis is not perfect; it needs to be improved on. ...
doi:10.5815/ijwmt.2012.01.07
fatcat:fdngo3znmfeztkqj4a3qwije4i
A Secure Network Coding Based on Broadcast Encryption in SDN
2016
Mathematical Problems in Engineering
In this paper, we propose a novel fast and secure switch network coding multicast (SSNC) on the software defined networks (SDN). ...
By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. ...
[19] proposed a RIPPLE, a symmetric key based in-network solution for network coding authentication, which is on the basis of the homomorphic Mac and TESLA [20] . ...
doi:10.1155/2016/7145138
fatcat:ho4wxc4bcfgrxmmd6pxhdnfuiu
Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption
2020
Journal of Information Processing Systems
on fully homomorphic encryption using the FV scheme. ...
At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method. ...
Most of the existing authentication systems are based on the improvement of the above biometric template protection scheme, and there are few authentication systems based on fully homomorphic encryption ...
doi:10.3745/jips.03.0138
dblp:journals/jips/SongCS20
fatcat:twpckspojfa53b67a7nmwenr6e
RIPPLE Authentication for Network Coding
2010
2010 Proceedings IEEE INFOCOM
In this paper, we propose RIPPLE, a symmetric key based in-network scheme for network coding authentication. ...
RIPPLE allows a node to efficiently detect corrupted packets and encode only the authenticated ones. ...
Previous research on providing source authentication for network coding falls into two broad categories: end-to-end and in-network schemes. ...
doi:10.1109/infcom.2010.5462051
dblp:conf/infocom/LiYCJR10
fatcat:indebqfepvf6vnm2jq7chv4txy
Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks
2016
Journal of Information Hiding and Multimedia Signal Processing
For network security issues, this paper proposed a secure aggregation scheme based on Stateful Public Key Cryptography (SPKC) for WSNs, which employs a new stateful public key encryption to provide an ...
Wireless sensor network (WSN) is an important part of the Internet of Things (IoT) and technical support for ubiquitous communication. ...
HMAC (Hash-based Message Authentication Code) is a kind of scheme based on encryption hash function and it is always used to validate the data integrity and source. ...
dblp:journals/jihmsp/QinJYWD16
fatcat:dvejbfpyznbgvpg54vpi7ksjuy
Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment
2024
Applied Mathematics and Nonlinear Sciences
This paper proposes a dynamic security threat assessment model and a robust optimal control strategy to improve the efficiency of detecting network vulnerabilities and the accuracy of detecting network ...
It also protects the privacy of the user's identity through a multi-factor continuous authentication method, encrypts and protects the user's data using a homomorphic encryption algorithm, and strengthens ...
The lightweight continuous authentication protocol for computer networks proposed in this section, which consists of two static authentication phases and a continuous authentication phase, can realize ...
doi:10.2478/amns-2024-0171
fatcat:ypagrb2wabas5jyzd4mqzbxe2e
An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
2016
IEEE Communications Letters
This paper presents a new homomorphic MAC-based scheme, called Dual-Homomorphic MAC (Dual-HMAC), for network coding-enabled wireless sensor networks. ...
Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-andforward transmission paradigm. ...
This work is based on a symmetric key based scheme for network coding authentication. ...
doi:10.1109/lcomm.2016.2547420
fatcat:e573q7zm7ze5jlhlvvmhg4e4xe
Secure Data Aggregation Aided by Privacy Preserving in Internet of Things
2022
Wireless Communications and Mobile Computing
Firstly, we discuss an improved homomorphic message authentication code (iHMAC) which can verify the integrity of sensing data and eliminate the injection of false data. ...
The security analysis and the simulation experiments verify that MASDA has better performances in terms of the security, the computation cost, the communication overhead, and the data accuracy. ...
Shandong Graduate Education Quality Improvement Plan under Grants SDYY17138, SDYKC21097. ...
doi:10.1155/2022/4858722
doaj:287e5e4bbdd14792994d3ddbde758892
fatcat:peukep3yifgybkeu6fj5iwqulu
Analytical Literature Survey on Existing Schemes to Improve Data Security and Robustness in Cloud Computing
2016
International Journal of Engineering Research and
This paper gives the various issues of cloud computing systems, the existing solutions to avoid the issues like security and data robustness, performance analysis of the schemes and comparison of the schemes ...
their demand for hardware and software service offered by cloud infrastructure. ...
This method is constructed as an improvement to erasure-coding and network coding-based systems in terms of reducing the computational cost compared to erasure coding and less storage cost compared to ...
doi:10.17577/ijertv5is100295
fatcat:qjvag43wsvho5iuvt6gn4q5vsy
Fast multicast scheme with secure network coding in cloud data centers
2016
Computer Science and Information Systems
This paper proposes a novel, fast, and secure network-coding multicast on software-defined networks. This scheme separates the complicated secure multicast management from fast data transmission. ...
Existing schemes mainly focus on homomorphic cryptographic technologies against such attacks. ...
This work is supported by the National Basic Research Program of China (2012CB315901), and also supported by National Natural Science Foundation of China (61373006). ...
doi:10.2298/csis160222013h
fatcat:v27ptppn4ve5fann7wu6ynfwry
E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs
2021
EAI Endorsed Transactions on Mobile Communications and Applications
In this paper, we improve their scheme by proposing a novel HMAC scheme for NC enabled WSNs, called E-HMAC, based on multi-linear space to check the integrity of coded packets. ...
In 2015, Esfahani et al. proposed a dual-homomorphic MAC scheme based to the construction of two different MACs to ensure the integrity of coded packets. ...
Proposed Scheme We present an Efficient Homomorphic MAC scheme based on multi-linear space for wireless sensor networks, called E-HMAC, to improve the security flaws of Esfahani et al.' ...
doi:10.4108/eai.29-9-2021.171189
fatcat:sl34wv6bevgdbkzkyc2fg22np4
« Previous
Showing results 1 — 15 out of 3,400 results