|
ROLE
BOOKMARK & SHARE
|
|
1
May 2017
ACM TUR-C '17: Proceedings of the ACM Turing 50th Celebration Conference - China
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 25, Downloads (12 Months): 32, Downloads (Overall): 32
Full text available:
PDF
With the increasing popularity of the fintech, the e-commerce market has grown rapidly in last decade, and now the mobile devices are unprecedented popular and playing an ever-increasing role in the e-commerce field, especially the mobile payment. However, it is hard for online authentication technology based on traditional mode to ...
Keywords:
U2F, mobile payment, privacy, security, mutual authentication
2
January 2017
ACSW '17: Proceedings of the Australasian Computer Science Week Multiconference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 17, Downloads (12 Months): 73, Downloads (Overall): 73
Full text available:
PDF
Smartphones are becoming increasingly popular in daily routines around the world. However, malware in smartphones is getting more prevalent, and will introduce potential risks to smartphone users. In this paper, we propose a new system, called Target , for detecting malware in the Android operating system, featuring both static and ...
Keywords:
application category, static and dynamic analysis, android malware, risk values
3
November 2016
Security and Communication Networks: Volume 9 Issue 16, November 2016
Publisher: John Wiley & Sons, Inc.
As one of the core techniques in 5G, the Internet of Things is more interested than ever. Furthermore, radio frequency identification RFID plays a crucial role in Internet of Things development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security ...
Keywords:
authentication, efficiency, ultralightweight, RFID, lightweight, IoT
4
November 2016
Security and Communication Networks: Volume 9 Issue 16, November 2016
Publisher: John Wiley & Sons, Inc.
In order to realize attribute-based data sharing in cloud computing, multi-authority attribute-based encryption MA-ABE is extremely attractive. However, most of the existing MA-ABE schemes cannot support a fully large attribute universe and are not suitable for resource-constrained mobile data owners in that the computation cost in secret key generation and ...
Keywords:
online/offline encryption, multi-authority, data sharing, online/offline key, attribute-based encryption, unbounded universe
5
September 2016
Security and Communication Networks: Volume 9 Issue 14, September 2016
Publisher: John Wiley & Sons, Inc.
As a public key cryptographic primitive, attribute-based encryption ABE is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that is, users' attribute privacy protection and access policy update. In this paper, we tackle the aforementioned ...
Keywords:
attribute-based proxy re-encryption, cloud computing, access control, access policy update, anonymity
6
August 2016
Wireless Communications & Mobile Computing: Volume 16 Issue 12, August 2016
Publisher: John Wiley and Sons Ltd.
With a great variety of potential applications, machine-type communications MTC is gaining a tremendous interest from mobile network operators and research groups. MTC is standardized by the 3rd Generation Partnership Project 3GPP, which has been regarded as the promising solution facilitating machine-to-machine communications. In the latest standard, 3GPP proposes a ...
Keywords:
security, LTE, authentication and key agreement AKA, M2M, MTC, proxy signature
7
August 2016
Information Processing Letters: Volume 116 Issue 8, August 2016
Publisher: Elsevier North-Holland, Inc.
Concurrent signature is a novel paradigm, which can achieve fair exchange of signatures between users. Since its appearance, the topic has been widely concerned, while the study of concurrent signature in multi-user setting suffers from some criticism. Almost all known multi-user concurrent signature schemes rely on the hardness assumptions that ...
Keywords:
Cryptography, Multi-party, SIS, Concurrent signature, Lattice
8
June 2016
Pervasive and Mobile Computing: Volume 28 Issue C, June 2016
Publisher: Elsevier Science Publishers B. V.
Ciphertext-policy attribute-based encryption (CP-ABE) is extremely suitable for cloud computing environment in that it enables data owners to make and enforce access policies themselves. However, most of existing CP-ABE schemes suffer severe efficiency drawbacks due to large ciphertext size and computation cost, and hence are not suitable for mobile clouds, ...
Keywords:
Constant cost, Attribute-based encryption, Data sharing, Mobile clouds
9
April 2016
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 99 Issue C, April 2016
Publisher: Elsevier North-Holland, Inc.
Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of ...
Keywords:
Group authentication and key agreement, Machine-type communications (MTC), The 3rd generation partnership project (3GPP), Lightweight, Machine to machine (M2M), Security
10
November 2015
Security and Communication Networks: Volume 8 Issue 17, November 2015
Publisher: John Wiley & Sons, Inc.
Machine-type communication MTC, as one of the most important communication approaches in the future mobile communication, has drawn more and more attention. To meet the requirements of low power consumption of devices and mass device transmission is the key issue to achieve MTC applications security in the long-term evolution LTE ...
Keywords:
TLA+ and TLC, access authentication, LTE, MTC, aggregate signature
11
October 2015
Security and Communication Networks: Volume 8 Issue 15, October 2015
Publisher: John Wiley & Sons, Inc.
Privacy-preserving aggregation for smart grid communications, which precisely meets the requirement of periodically collecting users' electricity consumption while preserving privacy of each individual user, has been extensively studied in recent years. However, most of existing privacy-preserving aggregation schemes are only focused on the summation aggregation. In this paper, based on ...
Keywords:
privacy-preserving aggregation, smart grid, dual-functional aggregation
12
August 2015
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01
Publisher: IEEE Computer Society
As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. ...
Keywords:
RFID, Authentication, Revocation, Security, Performance, 5G
13
August 2015
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01
Publisher: IEEE Computer Society
As one of the core techniques in 5G, the Internet of Things (IoT) is more interested than ever. Furthermore, Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. ...
Keywords:
RFID, Authentication, Revocation, Security, Performance, 5G
14
August 2015
Future Generation Computer Systems: Volume 49 Issue C, August 2015
Publisher: Elsevier Science Publishers B. V.
Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user's location privacy, many research solutions have been proposed. In this paper, we focus ...
Keywords:
Internet of things, Mobile computing, Wireless communications, Location-based services, Location privacy
15
December 2014
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 75 Issue PA, December 2014
Publisher: Elsevier North-Holland, Inc.
As a promising application scenario of wireless technologies, roaming communication initiates the demand for secure and efficient handoff authentication schemes. However, it seems that no existing scheme can simultaneously provide provable security and enjoy desirable efficiency. In this paper, we first utilize the double-trapdoor chameleon hash family to develop a ...
Keywords:
Double-trapdoor chameleon hashing, Handover authentication, Perfect backward secrecy, Handoff authentication, Provable security, Wireless network
16
December 2014
Frontiers of Computer Science: Selected Publications from Chinese Universities: Volume 8 Issue 6, December 2014
Publisher: Springer-Verlag New York, Inc.
To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) suggested using a digital signature directly over each bundle. However, when bundle fragment services are needed, this mechanism suffers from heavy computational costs, ...
Keywords:
bundle authentication, space-based delay tolerant networks, information security
17
November 2014
Security and Communication Networks: Volume 7 Issue 11, November 2014
Publisher: John Wiley & Sons, Inc.
Consider a signed file that cannot be verified because of some fraction loss or noise, which might not affect the business of users. It would be desirable for the verifier to locate the damaged fractions so that the authenticity of other components of the file can be ensured. Thereafter, the ...
Keywords:
digital signature, authentication, loss tolerance
18
November 2014
Security and Communication Networks: Volume 7 Issue 11, November 2014
Publisher: John Wiley & Sons, Inc.
The low prices on cloud data storage and sharing services incentive users to outsource their data to the cloud. Because data stored in the cloud may be lost or corrupted, users are suggested to verify data integrity before the utilization of cloud data. A series of schemes have been proposed ...
Keywords:
identity privacy, public verification, data integrity, cloud computing, multi-owner data
19
September 2014
CIT '14: Proceedings of the 2014 IEEE International Conference on Computer and Information Technology
Publisher: IEEE Computer Society
As one of the core techniques in the Internet of Things (IoT), Radio Frequency Identification (RFID) plays a crucial role in IoT development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security risks, privacy problems and efficiency due to its ...
Keywords:
authentication, efficiency, RFID, security
20
August 2014
Wireless Personal Communications: An International Journal: Volume 77 Issue 3, August 2014
Publisher: Kluwer Academic Publishers
Security and privacy issues in RFID technology gain tremendous popularity recently. However, existing work on RFID authentication problems always make assumptions such as (1) hash function can be fully employed in designing RFID protocols; (2) channels between readers and server are always secure. The first assumption is not suitable for ...
Keywords:
Ultralightweight, Mobile RFID systems, Privacy-preserving, Authentication
|
|