Aiming at the problem of blind source separation of the communication signals, we propose a step size optimization equivariant adaptive source separation via independence (SO-EASI) algorithm basing on the EASI block b...
详细信息
In this paper, we present an efficient authentication scheme with providing perfect forward secrecy and mobile user anonymity in wireless environment. When a mobile user and his visited network mutually authenticate e...
详细信息
In this paper, we present an efficient authentication scheme with providing perfect forward secrecy and mobile user anonymity in wireless environment. When a mobile user and his visited network mutually authenticate each other, the anonymity of user should be preserved because of user's privacy. In order to provide user anonymity, we introduce a new method of computing the session keys by basing on smart card. In our protocol, it takes only one round of message exchange between the mobile user and the visited network. The most significant feature is that enables perfect forward secrecy to the user identity and the session keys that established by the mobile user, the visited network and the corresponding home network.
Authentication is the most essential procedure to ensure that the service is properly used for wireless environments. Recently, Zhu and Ma proposed a novel authentication scheme with anonymity for wireless environment...
详细信息
ISBN:
(纸本)1424408016
Authentication is the most essential procedure to ensure that the service is properly used for wireless environments. Recently, Zhu and Ma proposed a novel authentication scheme with anonymity for wireless environments by basing on the hash functions and smart card, and mobile users only do symmetric encryption and decryption. And they claimed that their new scheme is security and provide user anonymity and so on. However, in this paper, we show that Zhu-Ma's new authentication scheme don't satisfy anonymity and untractability. Moreover, we still show that the authentication scheme is insecure when the mobile nodes' smart card leaked relative information. Accordingly, we present an improvement anonymous authentication scheme for wireless environments and the performance of our scheme is also analyzed.
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
详细信息
recently, Shen, Lin, and Hwang proposed a modified Yang-Shieh`s password authentication scheme to enhance security. In 2004,Yang and Chen et al. point out that Shen-Lin-Hwang`s scheme was vulnerable to the forged logi...
详细信息
recently, Shen, Lin, and Hwang proposed a modified Yang-Shieh`s password authentication scheme to enhance security. In 2004,Yang and Chen et al. point out that Shen-Lin-Hwang`s scheme was vulnerable to the forged login attack. Later, Wang and Li present a new efficient timestampbased remote user authentication scheme via further modified Shen-Lin-Hwan`s scheme. And they also claimed that their new modified scheme could withstand the forged login attack. However, in this paper, we show that the Yang and Li`s improvement scheme is still vulnerable to the reflection attack, and propose our improvement scheme.
In this correspondence, we examine the security of block ciphers referred to as substitution-permutation networks (SPN) by considering the impossible differential characteristics of given S-boxes. When the SPN has 2-r...
详细信息
In this correspondence, we examine the security of block ciphers referred to as substitution-permutation networks (SPN) by considering the impossible differential characteristics of given S-boxes. When the SPN has 2-round, we obtain a new upper bound on the maximum impossible differential probability MIDP. Moreover, when using a recursive technique, we obtain a general result for the MIDP of r (r≥8) rounds SPN ciphers. Furthermore, when our result applies to r (r≥8) rounds AES, It is shown that the upper bound of MIDP is up to 1, which means AES may be existence of characteristics with differential probability 0 in high rounds.
Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RE...
详细信息
ISBN:
(纸本)1424402212
Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RED) AQM scheme, and most of its variants use average queue length as a congestion indicator to trigger packet dropping. This paper proposes a novel AQM algorithm, called Self-tuning Proportional and Integral RED (SPI-RED), as an extension of RED. SPI-RED is based on a Self-tuning Proportional and Integral controller, which not only considers the average queue length at the current time point, but also takes into consideration the past average queue lengths during a round-trip time. Furthermore, we give theoretical analysis of the system stability and give guidelines for the selection of feedback gains for the TCP/RED system to stabilize the average queue length at a desirable level. Extensive simulations have been conducted with ns2. The simulation results have demonstrated that the proposed SPI-RED algorithm outperforms the existing AQM schemes in terms of drop probability and stability.
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper, the access control requirements in such environments were identified, and an access control model for P2P file-sharing systems based on trust and recommendation was proposed. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmission connections can switch smoothly among the multiple proxies by maintaining a coherent connection context. The mechanism is transparent to application programs and can support the building of VPN. With the cooperation of some other security components, the mechanism guarantees the resource availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection *** mechanism is transparent to application programs and can support th e building of *** the cooperation of some other security components,the mechanism guarantees the reso urce availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
暂无评论