No abstract available.
A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks
As various applications of sip-based VoIP networks have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we present a certificate-based two party authentication key agreement ...
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem
Many emerging network applications are based upon group communication models and are implemented with multicast communications. We address the problem of distributing a secret session key to a secure multicast group. In a pair of such key management ...
Conditional Privacy Using Re-encryption
This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n ...
Using Outlier Detection to Reduce False Positives in Intrusion Detection
Intrusion Detection Systems (IDSs) can easily create thousands of alerts per day, up to 99% of which are false positives (i.e. alerts that are triggered incorrectly by benign events). This makes it extremely difficult for managers to analyze and react ...
Identity-Based On-Line/Off-Line Signcryption
We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available (i.e., off-line stage) and the on-line part of our scheme does not require any exponent computations and ...
Attribute Delegation Authorization Based on Subjective Trust Evaluation
Trust-based delegation authorization mechanism is regarded as an effective method for computational resource access in open dynamic environment. One important problem is how to apply more grain subjective trust control on delegation and authorization ...
A Multi-core Supported Intrusion Detection System
Integrated multi-core processors with on-chip application acceleration have established themselves as the most efficient method of powering next-generation networking platforms. New research has been conducted for addressing the issues of multi-core ...
Synchronization of Discrete Chaotic Dynamical Systems Using Active Control
In this paper, both synchronization and generalized synchronization of two discrete chaotic dynamical systems are studied using active control. Specially, for maps operating under non-identical parameter, we validated that the dynamics of the response ...
Secure Prophet Address Allocation for Mobile Ad Hoc Networks
A mobile node in a MANET must be assigned with a free IP address before it may participate in unicast communications. This is a fundamental and difficult problem in the practical application of any MANET. There have been several solutions proposed, ...
Two Security Problems of RFID Security Method with Ownership Transfer
Radio Frequency Identification (RFID) is a technology that allows automatic identification and data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security method based on a hash function and a symmetric key cryptosystem. ...
Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA Substitutions
This paper presents a new stream cipher for data security, which is based on the replacement of data values using variable ordered recursive cellular automata (CA) substitutions. To achieve this aim, 2-D hybrid CA was built firstly, then 1st-ordered and ...
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm
Byun et al. proposed a cross-realm client-to-client password-authenticated key exchange (C2C-PAKE) protocol in ICICS'02. The protocol enables two clients in different realms to agree on a common session key by using different passwords. In this paper, ...
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism
Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network ...
Experimental Tests on SCTP over IPSec
As telecommunication technologies evolve, security in communications becomes a more and more relevant issue. IPSec is a set of protocols aiming to enhance security at the IP layer. Specifically, IPSec and IKE are important security mechanism that ...
A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor Networks
Data aggregation is a fundamental building block in sensor networks for power-efficient data collecting, thereby it is important to protect it from attack. In this paper, we consider defending against attackers who intend to stealthily change the ...
Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System
Many research efforts on application of ontology in network security have been done in the past decade. However, they mostly stop at initial proposal or focus on framework design without detailed representation of intrusion or attack and relevant ...
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication
The recent growth of multimedia group of applications is driving the need for secure multicast communication. Secure Multicast communication in dynamic environments like wireless networks and Grids are potentially of critical concern. As Multicast group ...
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection
Piromsopa and Enbody [10] proposed Secure Bit, an architectural approach to protect against buffer-overflow attacks on control data (return-addresses and function pointers). This paper explores the possibility of extending Secure Bit to protect non-...
An Improved Method for Ranking of Search Results Based on User Interest
The most common task for a forensic investigator is to search a hard disk to find interesting evidences. While, the most search tools in digital forensic field fundamentally utilize text string match and index technology, which produce high recall (100%)...