Results 61 to 70 of about 95,997 (171)

Electronic cash system based on certificateless group signature

open access: yesTongxin xuebao, 2016
An efficient elliptic certificateless group signature ith forward security and member revocation based on ACJT group signature was proposed.Compared to ACJT which has complex computation,many parameters and long signature length,proposed scheme has less ...
Yan LIANG, Xiao ZHANG, Zhi-ming ZHENG
doaj  

Forward Secure Non-Interactive Key Exchange [PDF]

open access: yes, 2014
Exposure of secret keys is a major concern when cryptographic protocols are implemented on weakly secure devices. Forward security is thus a way to mitigate damages when such an event occurs. In a forward-secure scheme, the public key is indeed fixed while the secret key is updated with a one-way process at regular time periods so that security of the ...
Pointcheval, David, Sanders, Olivier
openaire   +2 more sources

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques

open access: yesSensors
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Yongho Ko   +2 more
doaj   +1 more source

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

Discussion on the cultivation of cyber security talents

open access: yes网络与信息安全学报, 2019
The competition in cyberspace is ultimately the competition of talents. Nowadays, countries around the world pay great attention to the training of cyber security talents.
WENG Jian, WEI Linfeng, ZHANG Yue
doaj   +1 more source

Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

open access: yesITM Web of Conferences, 2017
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian   +3 more
doaj   +1 more source

Analysis and improvement of an ID-based authenticated key agreement protocol

open access: yesTongxin xuebao, 2008
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1   +2 more
doaj   +2 more sources

Forward-secure ciphertext-policy attribute-based encryption scheme

open access: yesTongxin xuebao, 2014
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj   +2 more sources

Network security threat prevention and control system of electric power monitoring systems for wind farm

open access: yesDianxin kexue, 2020
The frequent occurrence of network security incidents on wind farms seriously threatens the safety of power plants and power grids.The network security risk of power monitoring system on wind farms was analyzed from five aspects,including structure ...
Wei DING
doaj   +2 more sources

Home - About - Disclaimer - Privacy