Results 21 to 30 of about 1,094,705 (275)
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags [PDF]
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT).
Liu Ya-li +3 more
doaj +1 more source
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence [PDF]
Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat.
I. Boureanu, S. Vaudenay
doaj +1 more source
Identity-based puncturable signature scheme
To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the ...
Dongmei YANG +3 more
doaj +2 more sources
Toward Forward Secure SSE Supporting Conjunctive Keyword Search
The primitive of Searchable Symmetric Encryption (SSE) allows a server to perform search directly over encrypted documents. Recently, forward secure SSE (FSSE) has attracted significant attention due to its secure property for document update.
Yunling Wang +4 more
doaj +1 more source
Efficient Anonymous Authentication for Wireless Body Area Networks
Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients
Chuang Li, Chunxiang Xu
doaj +1 more source
Port Forwarding Services Are Forwarding Security Risks
We conduct the first comprehensive security study on representative port forwarding services (PFS), which emerge in recent years and make the web services deployed in internal networks available on the Internet along with better usability but less complexity compared to traditional techniques (e.g., NAT traversal techniques). Our study is made possible
Wang, Haoyuan +4 more
openaire +2 more sources
Secure Compute-and-Forward in a Bidirectional Relay
We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node.
Kashyap, Navin +2 more
core +1 more source
Secure Transmission in Amplify-and-Forward Diamond Networks with a Single Eavesdropper
Unicast communication over a network of $M$-parallel relays in the presence of an eavesdropper is considered. The relay nodes, operating under individual power constraints, amplify and forward the signals received at their inputs.
Agnihotri, Samar +2 more
core +1 more source
Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj +1 more source
On Forward-Secure Storage [PDF]
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire +1 more source

