Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security, 2011We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG.
Mike Burmester, Jorge Munilla
openaire +3 more sources
‘The Backward Will Be Beaten’: Historical Lesson, Security, and Nationalism in China
Journal of Contemporary China, 2020What has China learned from the ‘Century of Humiliation’? In China’s mnemonic practices, ‘the backward will be beaten,’ which attributes the nation’s humiliation experiences to economic, military, ...
Yi Wang
openaire +3 more sources
VoIP Secure Communication Protocol satisfying Backward Compatibility
2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007Several VoIP security protocols have been standardized for preventing many VoIP threats. But since several VoIP carriers have different VoIP protocols, end-to-end VoIP secure communication can not be possible. Also when initiator using secure VoIP phone wants a secure communication with responder using non-VoIP phone such as PSTN phone, or cellular ...
Joongman Kim +3 more
openaire +1 more source
Forward and backward secure keyword search with flexible keyword shielding
Information Sciences, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Zhijun +4 more
openaire +1 more source
Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward Security
IEEE Internet of Things JournalChenbin Zhao +6 more
openaire +3 more sources
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003An automatic security protocol generator is proposed that used logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions.
Hongbin Zhou, Simon N. Foley
openaire +1 more source
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update operations leak some information of updated data.
Shi-Feng Sun +6 more
openaire +1 more source
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
2021Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their efforts to obtaining forward and backward security and practical performance.
Tianyang Chen +5 more
openaire +1 more source
Securing mineral supply: backwards vertical integration for technology companies
2023The demand for minerals has increased with the growing production of standard technologies, such as EV car batteries, wind turbines, and solar panels. However, major mining companies need help to satisfy the demand at the current rate, leading to inconsistent and expensive supply chains and environmental and geopolitical concerns.
openaire +1 more source
Backward Cloud Based Elimination of Uncertainty in Security Assessment Parameters
2010 International Conference on Electrical and Control Engineering, 2010The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of describing the uncertainty in the selection procedure, and the method based on interval matrixes does not measure the degree of credibility ...
Bing Xia, Xiangdong Li, Qiusheng Zheng
openaire +1 more source

