Xiaoyu et. al. [1] presented efficient identity based (K, n) threshold signcryption scheme. In this paper, we present variant of [1] with group shared unsigncryption, which is based on discrete logarithm problem in fi...
详细信息
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Such network scenarios cannot rely on centralized and organized connectivity, and ca...
详细信息
In this Information Age, security of personal data is one of the biggest issues faced by most of the nations. Biometrics provides substantial help in guarding against attempts to establish fraudulent multiple identiti...
详细信息
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be adaptable to various Cryptographic Hash Function algorithms and different hash function co...
详细信息
CAPTCHA stands for Completely Automated Public Turing test to distinguish computers and Humans apart. CAPTCHA is a program which can generate and grade the tests that it itself cannot pass. The security aspect of CAPT...
详细信息
This paper presents a high performance reconfigurable hardware implementation of speech scrambling-descrambling system which can be used for military and high security environments. The scrambling algorithm is based o...
详细信息
This book constitutes the refereed proceedings of the Second international conference on security in computer networks and distributed systems, snds 2014, held in Trivandrum, India, in March 2014. The 32 revised full ...
详细信息
ISBN:
(数字)9783642545252
ISBN:
(纸本)9783642545245
This book constitutes the refereed proceedings of the Second international conference on security in computer networks and distributed systems, snds 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second international Workshop on security in Self-Organising networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information security (CIS 2014); Second international Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
Last two decades have witnessed tremendous growth of internet and it acts as a centrifugal force for a whole new array of applications and services which drives the e- business/ commerce globally. Millions of applicat...
详细信息
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computin...
详细信息
ISBN:
(纸本)9781467315449;9781467315425
The Internet is currently being used by millions of users for web browsing, data storage, social networks, communications, VOIP, e-commerce, and other applications that are enabled by wireless networks, cloud computing, distributedsystems, and cellphone networks. The architecture for these applications is not secure as shown by all the recent widely-publicized attacks. We propose a comprehensive security model for networking applications that includes new key distribution and management techniques and a realistic trust model.
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure-less network of mobile devices connected by wireless links. Lack of fixed infrastructure, wireless medium, dynamic topology, rapid deployment pract...
详细信息
暂无评论