In this paper we survey several applieations of classieal geometrie structures to cryptology. Particularly we shall deal with authentication schemes, threshold schemes, network problems and WOM-codes. As geometrie counterparts we shall... more
Summary This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the message confidentiality, non-repudiation and unforgeability, the proposed scheme achieves forward secrecy and encrypted message... more
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been proposed in an Internet Engineering Task Force (IETF)... more
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been proposed in an Internet Engineering Task Force (IETF)... more
The goal of an authentication system is to verify and authorise users, in order to protect restricted data and information. After authentication, two principals (people, computers, services) in a distributed system should be entitled to... more
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main... more
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources.... more
When it became known that quantum computers could break the RSA (named for its creators -Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical... more
This letter studies the rate-equivocation region of a degraded signal-dependent noise wiretap channel (SDGN-WC), where the noise is Gaussian. This signal-dependent noise occurs in optical wireless communication (OWC) settings based on... more
Although Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved... more
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data... more
We describe a construction of almost universal hash functions suitable for very fast software implementation and applicable to the hashing of variable size data and fast cryptographic message authentication. Our construction uses fast... more
The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking... more
The Concept of Distributed System made life easier to communicate and share resources from any other system with the help of network. Due to the emergence of Distributed system, Data Security has become an increasing concern, and... more
In this paper, we propose a multi-biometrics authentication system based on our proposed priority-based watermarking method. We investigate how watermarking techniques affect the container, which is facial image used in further... more
In this paper, we propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the original CRTHACS scheme [2] and were recently reported in [1].
In this paper, we propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the original CRTHACS scheme [2] and were recently reported in [1].
This paper describes a system that controls access to computer networks through publicly accessible LANs, enabling network administrators to authorize users either on a permanent or occasional basis. The system has been designed with... more
Vehicular Ad-Hoc Network (VANET) which is an application of mobile area network(MANET) are one of the main areas of research since they are expected to greatly influence and improve safe driving and traffic conditions. Apart from the... more
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the... more
With a partially blind signature scheme, the signer inoculates a non-removable common information into his blind signature. This common information may represent the date or the amount of cash. Due to its un-traceablility and partial... more
In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature scheme and a parallel multisignature scheme) that are suitable for authenticating the delegated access, because of its efficiency of computation and... more
Owing to the rapid development of microelectronics techniques, the computation power of low-cost processors has increased greatly. Therefore, based on a public-key and secret-key hybrid algorithm, Zhibin and Naitong proposed an... more
Stcps (i)-(iv) are performcd Cor all image blocks, and the reconstructed codcwords arc pieced together into llie watcrmarkcd image. The extraction process for each watermarked image block can be perfornicd without thc original image, and... more
The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication method which is widely used in practice. It is well known that the use of the CBC MAC for variable length messages is not secure, and a few rules of... more
Based on sharing and lattice-embedding techniques, we present an authentication-recovery method for an image. The recovery data are shared among many shadows, then lattice-embedding is utilized to embed each shadow in the discrete cosine... more
Canada de reproduire, publier, archiver, sauvegarder, conserver, transmettre au public par télécommunication ou par l'Internet, prêter, distribuer et vendre des thèses partout dans le monde, à des fins commerciales ou autres, sur support... more
In this position paper, we motivate and summarize our work on repeatably generating cryptographic keys from spoken user input. The goal of this work is to enable a device to generate a key (e.g., for encrypting files) upon its user... more
We define a new authentication tree in the symmetric key setting, which has the same computational time, storage and security parameters as the well known Merkle authentication tree, but which unlike the latter, allows for all the... more
Purpose-One-time password systems provide great strengths over conventional password systems: protection against over-the-shoulder, eavesdropping, replay, etc. The Grid Data Security authentication system is a server-challenge-based... more
A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise... more
Computing real-time road condition is really tough and it is not achieved using GPS. However, a malicious node can create multiple virtual identities for transmitting fake messages using different forged positions. A malicious vehicle can... more
The last decade has seen explosive growth in the development of mobile applications. This has increased the demand on the wireless communication services. The capability to achieve wireless access anywhere, anytime, and anyplace has... more
This paper presents a secure routing protocol for wireless sensor networks based on the recognized directed diffusion algorithm. The proposed secure routing protocol uses the μTESLA (micro Timed, Efficient, Streaming, Loss-tolerant... more
In this paper, we study a recent biometric modality for user authentication on mobile devices. The proposed solution is a two-factor user authentication scheme and gives some high guarantees on user's identity. We first use the knowledge... more
This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the... more
In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a... more
This paper presents a Mobile IPv6-based overlay network architecture for heterogeneous environments, designed entirely based on IPv6, that aims to be implemented seamlessly irrespectively of the supporting network infrastructure. All... more
Computer malware is one of the greatest dangers to the modern society, allowing attackers to uncover restricted data and to control a wide range of critical infrastructure. Furthermore, computer malware evolve rapidly, forcing... more
This paper presents a Mobile IPv6-based overlay network architecture for heterogeneous environments, designed entirely based on IPv6, that aims to be implemented seamlessly irrespectively of the supporting network infrastructure. All... more
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal... more
The design of highly nonlinear functions is relevant for a number of different applications, ranging from database hashing to message authentication. But, apart from useful, it is quite a challenging task. In this work, we propose the use... more
The design and development of a pressure sensor based typing biometrics authentication system (BAS) is discussed in this paper. The dynamic keystroke, represented by its time duration and force generates a waveform, which when... more
Vehicle Ad-hoc Networks (VANET) are considered among recent wireless communication technologies. Nowadays, vehicles are no more than simple means of transport, they are endowed with a source of intelligence through their interaction with... more
Vehicle Ad-hoc Networks (VANET) are considered among recent wireless communication technologies. Nowadays, vehicles are no more than simple means of transport, they are endowed with a source of intelligence through their interaction with... more
The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, eHealth, and... more
Authenticated Encryption (AE) is a block cipher mode of operation which provides confidentiality and integrity simultaneously. In terms of the hardware implementation, it produces smaller area compared to two separated algorithms.... more
This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher... more
Reconfiguration of FPGAs is becoming increasingly popular particularly in networking applications. In order to protect FPGA designs against attacks, secure reconfiguration must be performed. This paper presents efficient ASIC... more