|
ROLE
Author only
BOOKMARK & SHARE
|
|
1
April 2016
IEEE Transactions on Information Forensics and Security: Volume 11 Issue 4, April 2016
Publisher: IEEE Press
Ma et al. recently submitted a comment correspondence which points out a flaw in our paper (a sequel of our earlier paper published in the Proceedings of IEEE INFOCOM ). The flaw led to the leakage of the system-wide master key; therefore, we improved our own scheme by addressing it.
2
November 2013
ISC 2013: Proceedings of the 16th International Conference on Information Security - Volume 7807
Publisher: Springer-Verlag New York, Inc.
Attribute-based encryption ABE is well suited for fine-grained access control for data residing on a cloud server. However, existing approaches for user revocation are not satisfactory. In this work, we propose a new approach which works by splitting an authorized user's decryption capability between the cloud and the user herself. ...
3
June 2012
MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5, Downloads (12 Months): 9, Downloads (Overall): 294
Full text available:
PDF
Longest-queue-first (LQF) link scheduling is a greedy link scheduling in multihop wireless networks. Its stability performance in single-channel single-radio (SC-SR) wireless networks has been well studied recently. However, its stability performance in multi-channel multi-radio (MC-MR)wireless networks is largely under-explored. In this paper, we present a stability subregion with closed form ...
Keywords:
link scheduling, multi-channel multi-radio, stability
4
April 2012
IEEE Transactions on Information Forensics and Security: Volume 7 Issue 2, April 2012
Publisher: IEEE Press
Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) ...
5
May 2011
ISPEC'11: Proceedings of the 7th international conference on Information security practice and experience
Publisher: Springer-Verlag
Cloud computing has emerged as the most influential paradigm in recent years. The new computing technology requires users to entrust their data to the cloud provider, which leads to security issues on the outsourced data. In order to achieve scalable, fine-grained and flexible access control for cloud computing, we extends ...
6
September 2010
CASON '10: Proceedings of the 2010 International Conference on Computational Aspects of Social Networks
Publisher: IEEE Computer Society
Nowadays, online social network data are increasingly made publicly available to third parties. Several anonymization techniques have been studied and adopted to preserve privacy in the publishing of data. However, recent works have shown that de-anonymization of the released data is not only possible but also practical. In this paper, ...
Keywords:
Online Social Network, De-anonymization, Privacy
7
June 2010
MCS '10: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4, Downloads (12 Months): 34, Downloads (Overall): 635
Full text available:
PDF
A number of mobile online social networking (OSN) services appear in the market. Majority of mobile systems can strongly benefit from services offered by cloud. However, centralized servers and communication infrastructures may not always be available. Further their location-based services are not offered to low-end mobile devices without GPS modules. ...
Keywords:
WiFi, privacy, social network, MANET, WiFace
8
December 2009
MSN '09: Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
Publisher: IEEE Computer Society
Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to ...
Keywords:
Location Privacy, Base Station
9
November 2009
GLOBECOM'09: Proceedings of the 28th IEEE conference on Global telecommunications
Publisher: IEEE Press
With rapid growth of Online Social Networks (OSN), more and more users are attracted to share their personal information or even cooperate in business via OSN. Therefore, the issues of privacy and security in OSN become more important than ever. In this paper, we address the issue of securely delivering ...
Keywords:
identity-based cryptography, key management, security, social networks
10
September 2009
ISC '09: Proceedings of the 12th International Conference on Information Security
Publisher: Springer-Verlag
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there ...
Keywords:
Access control, Anonymity, Ciphertext-policy, Attribute-based, Accountability
11
March 2009
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 7, Downloads (Overall): 357
Full text available:
PDF
Wireless mesh network (WMN) provides a low-cost, convenient solution to the last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are not applicable in WMNs anymore. In this paper, we propose a solution for security and privacy protection for ...
Keywords:
information security, wireless mesh networks, anonymous routing
12
January 2009
Journal of Computer Science and Technology: Volume 24 Issue 1, January 2009
Publisher: Institute of Computing Technology
Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- n PAKE + protocol under the setting where each party shares an independent password with a trusted server. ...
Keywords:
password-authenticated key exchange, group key agreement, security protocol
13
March 2008
WiSec '08: Proceedings of the first ACM conference on Wireless network security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4, Downloads (12 Months): 20, Downloads (Overall): 587
Full text available:
PDF
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless networks, we proposed a hierarchical ID-based roaming protocol in this paper. In our scheme, we use ...
Keywords:
mobile networks, privacy, roaming protocols
14
December 2007
ICICS'07: Proceedings of the 9th international conference on Information and communications security
Publisher: Springer-Verlag
Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol n PAKE + protocol under the setting where each party shares an independent password with a trusted server. The ...
15
February 2007
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 51 Issue 3, February, 2007
Publisher: Elsevier North-Holland, Inc.
In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the ...
Keywords:
Access control, Security protocol, Wireless networks
16
June 2006
IEEE Transactions on Wireless Communications: Volume 5 Issue 6, June 2006
Publisher: IEEE Press
The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually ...
17
November 2005
LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary
Publisher: IEEE Computer Society
Wireless networks have gained overwhelming popularity over their wired counterpart due to their great flexibility and convenience, but access control of wireless networks has been a serious problem because of the open medium. Passwords remain the most popular way for access control as well as authentication and key exchange. But ...
Keywords:
Wireless Networks, Security Protocol, Access Control
18
November 2004
LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Publisher: IEEE Computer Society
Although there are a large number of papers on secure routing in mobile ad-hoc networks, only a few consider the anonymity issue. In this paper, we define more strict requirements on the anonymity and security properties of the routing protocol, and notice that previous research works only provide Weak Location ...
19
August 2004
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 45 Issue 6, 21 August 2004
Publisher: Elsevier North-Holland, Inc.
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome this problem, this paper aims at building well established trust relationships in ad hoc networks without relying on any pre-defined assumption. We propose a ...
Keywords:
distributed trust model, ad hoc networks, security, trust management
|
|