[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 9, Issue 10July 2016
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISSN:1939-0114
EISSN:1939-0122
Reflects downloads up to 29 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Issue Information

No abstract is available for this article.

article
A novel self-checking ad hoc routing scheme against active black hole attacks

It is challenging to design a routing scheme that can successfully operate in the presence of adversarial environment in mobile ad hoc network MANET, where several types of severe routing security threats can be easily employed against normal routing. ...

article
The value of flow size distribution in entropy-based detection of DoS attacks

This paper investigates the use of flow size distribution as a source in entropy-based detection. The performance of detection based on this distribution is compared with the performance of detection based on simple packet distribution, namely ...

article
User-friendly random-grid-based visual secret sharing for general access structures

Compared with the visual-cryptography-based visual secret sharing, the random-grid-based visual secret sharing RGVSS has some technical advantages, such as no pixel expansion and no need of codebooks. Designed based on RGVSS, the user-friendly random-...

article
Home area network accountability with varying consumption devices in smart grid

Among the principals for securing smart grid infrastructure, accountability is one with lesser addressed concepts in smart grid literature. Even further, studies in the home area network are lacking in enforcement of accountable mechanisms as assigning ...

article
A secure white-box SM4 implementation

White-box cryptography aims at implementing a cipher to protect its key from being extracted in a white-box attack context, where an attacker has full control over dynamic execution of the cryptographic software. So far, most white-box implementations ...

article
Many-to-one homomorphic encryption scheme

The existing homomorphic encryption schemes are mostly in the form of "one-to-one" deployment models, where one party usually encrypts the plaintext and another party decrypts the ciphertext in public key cryptosystem. This form of cryptography loses ...

article
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage

The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes for previous literature. We present a semantic-security model with post-challenge continuous auxiliary inputs for identity-based ...

article
Investigation of security issues for service-oriented network architecture

The current Internet is facing unprecedented demands, and the challenges and protocols were designed and incorporated into the system as a patchwork for solving many issues. The patchwork approach of non-integrated security mechanisms does not ...

article
Intrusion detection algorithm based on OCSVM in industrial control system

In order to detect abnormal communication behaviors efficiently in today's industrial control system, a new intrusion detection algorithm based on One-Class Support Vector Machine OCSVM is proposed in this paper. In this algorithm, a normal ...

article
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices

Future healthcare systems, smart homes, and similar will involve a large number of smart inter-connected wireless devices such as wireless sensor nodes. One of the major challenges to securing these systems presents loading initial cryptographic ...

article
Security analysis of network protocols through model checking: a case study on mobile IPv6

The advent of computer networks makes network protocols - running on this unprotected environment - vulnerable against various attacks and malefactions. Hence, methods for automatic security verification of protocols in the early stages of protocol ...

article
Provably secure group key agreement protocol based on ECDH with integrated signature

This paper proposes a new two round authenticated contributory group key agreement ACGKA protocol based on elliptic curve Diffie-Hellman ECDH with integrated signature. In this technique, one node is picked up as the group controller, and this node runs ...

article
A stochastic model for the size of worm origin

Computer worms have infected millions of computers since the 1980s. For an incident handler or a forensic investigator, it is important to know whether the worm attack to the network has been initiated from multiple different sources or just from one ...

article
Tweakable parallel OFB mode of operation with delayed thread synchronization

Introduction of various cryptographic modes of operation is induced with noted imperfections of symmetric block algorithms. Design of some cryptographic modes of operation has already been exploited as an idea for parallelization of certain algorithms ...

article
Mitigating insider threat in cloud relational databases

Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks ...

article
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber-physical system CPS, all objects in cyber world and physical world would be connected, and the concepts of cyber world ...

article
Quantum-resistance authentication in centralized cognitive radio networks

This paper presents a new method for mutual authentication in centralized cognitive radio networks. In doing so, we analyzed the proposed scheme in terms of security and performance. As for security, we analyzed the proposed scheme from a mathematical ...

article
Security analysis of Khudra: a lightweight block cipher for FPGAs

Khudra is a lightweight block cipher for field-programmable gate arrays, which appeared in SPACE 2014. In this paper, we consider the security of Khudra against the related-key attack. Firstly, we give some observations of F-function. Then we design a ...

article
PFX: an essence of authencryption for block-cipher security

Privacy and authentication are two primary aspects of many security systems. In this article, we propose a new mode of operation for block encryption called plain-text feedback XORing PFX, which can assure both confidentiality and message integrity ...

article
Novel secure VPN architectures for LTE backhaul networks

In this paper, we propose two secure virtual private network architectures for the long-term evolution backhaul network. They are layer 3 Internet protocol IP security virtual private network architectures based on Internet key exchange version 2 ...

article
A novel approach for spam email detection based on shifted binary patterns

Advances in communication allow people flexibility to communicate in various ways. Electronic mail email is one of the most used communication methods for personal or business purposes. However, it brings one of the most tackling issues, called spam ...

article
A survey of lightweight stream ciphers for embedded systems

Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight ...

article
Survey of return-oriented programming defense mechanisms

A prominent software security violation-buffer overflow attack has taken various forms and poses serious threats until today. One such vulnerability is return-oriented programming attack. An return-oriented programming attack circumvents the dynamic ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.