oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext  [cached]
Bo Meng
Journal of Networks , 2009, DOI: 10.4304/jnw.4.5.370-377
Abstract: Internet voting protocol is the base of the Internet voting systems. Firstly, an improved proof protocol that two ciphertexts are encryption of the same plaintext is introduced. Secondly, a receipt-free and coercion-resistant Internet voting protocol based on the non-interactive deniable authentication protocol and an improved proof protocol that two ciphertexts are encryption of the same plaintext is developed. Thirdly, we analyze the proposed Internet voting protocol. The proposed Internet voting protocol has the properties of universal verifiability, receiptfreeness and coercion-resistance. At the same time the proposed protocol is with the weak physical assumption. Lastly, we compare security properties of the several typical Internet voting protocols with our present protocol.
A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol  [PDF]
Bo Meng
Information Technology Journal , 2009,
Abstract: In this study, firstly the status and security properties of deniable authentication protocol are discussed and then a secure non-interactive deniable authentication protocol based on discrete logarithm problem is developed. At the same time we prove that the proposed protocol has properties: completeness, strong deniability, weak deniability, security of forgery attack, security of impersonate attack, security of compromising session secret attack and security of man-in-the-middle attack. The security properties of several typical protocols and proposed protocol are compared. Lastly, an application of the proposed protocol, an internet voting protocol with receipt-freeness without strong physical assumption, is provided.
Audio-Visual Recognition System Insusceptible to Illumination Variation over Internet Protocol
Yee Wan Wong,Kah Phooi Seng,Li Minn Ang
IAENG International Journal of Computer Science , 2009,
Abstract:
Authentication Systems in Internet of Things  [PDF]
Tuhin Borgohain,Amardeep Borgohain,Uday Kumar,Sugata Sanyal
Computer Science , 2015,
Abstract: This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.
Formal Protocol Design of ESIKE Based on Authentication Tests  [cached]
Rui Jiang,Aiqun Hu,Jianhua Li
International Journal of Network Security , 2008,
Abstract: In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE) protocol. Then we formally prove the secure properties of ESIKE with strand space model and authentication tests. The ESIKE protocol overcomes the security shortages of the Internet Key Exchange (IKE), and can provide secure negotiation of session key and Security Association (SA), protection of endpoints' identities, and mutual authentication between the initiator and the responder. It needs only three messages and less computational load, so it is simple and efficient.
Quantum authentication protocol  [PDF]
Guihua Zeng,Guangcan Guo
Physics , 2000,
Abstract: In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
Watermarks and Text Transformations in Visual Document Authentication  [cached]
Igor Fischer,Thorsten Herfet
Journal of Computers , 2007, DOI: 10.4304/jcp.2.5.44-53
Abstract: Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based on cryptography and require computers or similar hardware to be produced. They can be trusted only as long as the employed hardware can be trusted. We present a complementary scheme for document authentication in untrusted environment. The scheme combines visual authentication, human- recognizable watermarks, and image transformations, and is suitable also for larger text document. Because it relies on visual cryptography, it requires practically no computational power on the receiver side. To prevent potential attackers from obtaining signatures without author’s knowledge, we propose using a simple challenge-response protocol.
Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol
Yoon Eun-Jun,Shin Yong-Nyuo,Jeon Il-Soo,Yoo Kee-Young
IETE Technical Review , 2010,
Abstract: The session initiation protocol (SIP) is a powerful signaling protocol that controls communication on the Internet, establishing, maintaining, and terminating the sessions. The services that are enabled by SIP are equally applicable in the world of mobile and ubiquitous computing. In 2009, Tsai proposed an efficient nonce-based authentication scheme for SIP. The current paper, however, demonstrates that Tsai′s authentication scheme is still vulnerable to offline password guessing attacks, Denning-Sacco attacks, and stolen-verifier attacks, and does not provide perfect forward secrecy. We also propose a new secure and efficient authentication scheme based on the elliptic curve discrete logarithm problem for SIP in order to overcome such security problems.
Towards Public Key Infrastructure less authentication in Session Initiation Protocol  [PDF]
Abdullah Al Hasib,Abdullah Azfar,Md. Sarwar Morshed
International Journal of Computer Science Issues , 2010,
Abstract: The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.
Towards Public Key Infrastructure less authentication in Session Initiation Protocol  [PDF]
Abdullah Al Hasib,Abdullah Azfar,Md. Sarwar Morshed
Computer Science , 2010,
Abstract: The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.