Showing 201 - 220 results of 262 for search '"cryptographer"', query time: 0.06s Refine Results
  1. 201

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  2. 202

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks by Wassim Znaidi, Marine Minier, Stéphane Ubéda

    Published 2013-04-01
    “…When nodes may be compromised, “beyond cryptography” algorithmic solutions must be envisaged to complement the cryptographic solutions. This paper addresses the problem of nodes replication; that is, an adversary captures one or several nodes and inserts duplicated nodes at any location in the network. …”
    Get full text
    Article
  3. 203

    Provably secure quantum resistance two-server password-authenticated key exchange protocol by Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN

    Published 2022-03-01
    “…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
    Get full text
    Article
  4. 204

    Blind video watermarking algorithm based on correlations between neighboring frames by GAO Qi, LI Ren-hou, LIU Lian-shan

    Published 2006-01-01
    “…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
    Get full text
    Article
  5. 205

    The Design Management and Developing Design Brief A Critique on the Book The Design Brief book by Maryam Kahvand

    Published 2021-10-01
    “…The thematic relationship between the content of some chapters is not sufficiently coherent, although it does include some key points in the design of cryptographic design and design management.…”
    Get full text
    Article
  6. 206

    Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS by Kefei Mao, Jianwei Liu, Jie Chen

    Published 2016-01-01
    “…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. …”
    Get full text
    Article
  7. 207

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks by Wei Ren, Liangli Ma, Yi Ren

    Published 2013-06-01
    “…In addition, that work mainly relies on cryptographic tools, in which key distribution is not a trivial task and also causes a large amount of computation overhead. …”
    Get full text
    Article
  8. 208

    Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security by Toshiki Matsumine, Hideki Ochiai, Junji Shikata

    Published 2025-01-01
    “…Meanwhile, as an alternative to cryptographic methods, physical layer security (PLS) has been extensively studied as a means to realize secure wireless communication that is resistant to attacks by both classical and quantum computers, i.e., quantum-safe. …”
    Get full text
    Article
  9. 209

    ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data by Xiangyi Meng, Yuefeng Du, Cong Wang

    Published 2025-01-01
    “…However, this shift introduces critical security and privacy risks, as sensitive patient information is stored on untrusted third-party servers. Existing cryptographic solutions, such as searchable encryption, offer some security guarantees but struggle with challenges like leakage-based attacks, high computational overhead, and limited scalability. …”
    Get full text
    Article
  10. 210

    TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones by Shehzad Ashraf Chaudhry, Azeem Irshad, Bander A. Alzahrani, Ahmad Alhindi, Mohd Shariq, Ashok Kumar Das

    Published 2025-01-01
    “…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. …”
    Get full text
    Article
  11. 211

    An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing by Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee

    Published 2021-01-01
    “…Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. …”
    Get full text
    Article
  12. 212

    A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks by Ramesh Sekaran, Ganesh Kumar Parasuraman

    Published 2014-01-01
    “…Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. …”
    Get full text
    Article
  13. 213

    Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU

    Published 2023-04-01
    “…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
    Get full text
    Article
  14. 214

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
    Get full text
    Article
  15. 215

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…Passive attacks such as eavesdropping and traffic analysis cannot be eliminated even if cryptographic technologies are used. Conventional frames are usually designed to include checksum, which facilitates to adversaries capturing correct frames for further attacks. …”
    Get full text
    Article
  16. 216

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. …”
    Get full text
    Article
  17. 217

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  18. 218

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    “…The DES is replaced by a number of new cryptographical methods, which based on DES, like AES and 3DES. …”
    Get full text
    Article
  19. 219

    AllianceBlockchain in the Governance Innovation of Internet Hospitals by Xiaofeng Wang, Xiaoguang Yue, Ahthasham Sajid, Noshina Tariq

    Published 2024-12-01
    “…These results demonstrate the capability of alliance blockchain and cryptographic upgrades in creating safe and efficient governance frameworks for Internet hospitals.…”
    Get full text
    Article
  20. 220

    A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments by S. Bharath Babu, K. R. Jothi

    Published 2025-01-01
    “…This paper presents a secure framework that addresses these concerns by integrating privacy-preserving parameters, zero-knowledge proofs (zk-SNARKs), blockchain technology, and a multi-tenant cloud environment. Through advanced cryptographic techniques, specifically zk-SNARKs, the framework ensures that healthcare records remain protected during analytics computations, without exposing raw data. …”
    Get full text
    Article