Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ...
详细信息
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and using the concurrent signature and it has prevented both sides in payment to originate and terminate protocol maliciously. At the same time fairness and security are also achieved in the proposed protocol.
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop...
详细信息
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature scheme. The security of proxy blind signature and the forward security are both analyzed in the proposed scheme. Even if the current signature key is compromised, the attacker cannot forge signatures as if they had been generated before the key leakage. That is to say, signatures signed before the leakage are still valid.
New families of binary sequences of period 2n-1 are constructed for even n. These families have optimal correlation properties with respect to the Welch bound. The distributions of their correlation values are complet...
详细信息
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale integration (VLSI). The proposed algorit...
详细信息
Recently, IEEE 802.16m was submitted to the ITU and acknowledged as the candidate technology of the IMT-advanced standardization. In this paper, we point out several security issues, such as key agreement blocking and...
详细信息
Recently, IEEE 802.16m was submitted to the ITU and acknowledged as the candidate technology of the IMT-advanced standardization. In this paper, we point out several security issues, such as key agreement blocking and Denial of Service (DoS) attacks, of the key management protocol in IEEE 802.16m. To address the found security issues, we propose an enhanced key management protocol, named as EKMP, which extends the pairwise master key and adds the integrity protection to all key agreement messages. EKMP can not only provide advanced relay station access but also avoid key agreement blocking and DoS attacks. In particular, our scheme is provably secure in the Canetti-Krawczyk model. Furthermore, our theoretical analysis shows that EKMP is much more efficient in terms of communication overhead and memory requirement.
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the *** methods with only one beacon introduce collinearity proble...
详细信息
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the *** methods with only one beacon introduce collinearity problem which degrades *** paper proposes a weighted centroid localization method using three mobile *** beacons preserve a special formation while traversing the network deployment area, and broadcast their positions *** sensor nodes to be localized estimate the distances to these beacons, and utilize weighted centroid localization scheme to calculate its *** shows that this method is superior to trilateration and weighted centroid algorithm with single mobile beacon.
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic...
详细信息
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, which can make robustness and invisibility best balanced. This article gives a new algorithm about digital video watermarking based on HVS, which makes digital video watermark greatly improved.
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, an...
详细信息
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, and fast in speed etc. Based on these superiorities of the conic curves, a new concurrent signature protocol on conic curve over ring Z n is proposed in this paper. It has higher efficiency than the one proposed by Chen L. Furthermore, the scheme is also based on the large number factorization and discrete logarithm in conic curves, so it has the same security.
The use of location-enabled mobile technology is ubiquitous. We outline the opportunities and risks involved in using user-generated spatial data and information. User generated spatial data is a very dynamic but has ...
详细信息
The use of location-enabled mobile technology is ubiquitous. We outline the opportunities and risks involved in using user-generated spatial data and information. User generated spatial data is a very dynamic but has many inconsistencies. This could severely limit its use in many security and intelligence applications.
暂无评论