期刊文献+
共找到1,111篇文章
< 1 2 56 >
每页显示 20 50 100
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
1
作者 Shafi Ullah Haidawati Muhammad Nasir +5 位作者 Kushsairy Kadir Akbar Khan Ahsanullah Memon Shanila Azhar Ilyas Khan Muhammad Ashraf 《Computers, Materials & Continua》 2025年第2期3223-3249,共27页
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb... Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness. 展开更多
关键词 Mutual authentication lightweight end-to-end encryption elliptic curve cryptography industrial internet of things curve25519 machine-to-machine communication
在线阅读 下载PDF
Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key
2
作者 Wangke Yu Shuhua Wang 《Computers, Materials & Continua》 SCIE EI 2023年第4期67-80,共14页
Wireless network is the basis of the Internet of things and theintelligent vehicle Internet. Due to the complexity of the Internet of things andintelligent vehicle Internet environment, the nodes of the Internet of th... Wireless network is the basis of the Internet of things and theintelligent vehicle Internet. Due to the complexity of the Internet of things andintelligent vehicle Internet environment, the nodes of the Internet of thingsand the intelligent vehicle Internet are more vulnerable to malicious destructionand attacks. Most of the proposed authentication and key agreementprotocols for wireless networks are based on traditional cryptosystems such aslarge integer decomposition and elliptic curves. With the rapid developmentof quantum computing, these authentication protocols based on traditionalcryptography will be more and more threatened, so it is necessary to designsome authentication and key agreement protocols that can resist quantumattacks. In this paper, an anti-quantum authentication scheme for wirelessnetworks based on lattice cryptosystem is constructed. In the attribute-basedauthentication scheme, the length of the authenticated public-private keypair depends on the maximum order and complexity of the formula in thealgorithm. In the attribute-based authentication scheme, there is a certaincorrelation between the authenticated data and the attribute value of theuser in the scheme. We show that the attribute-based authentication schemegives an attribute-based with smaller public-private key pairs. The securityof the attribute-based authentication scheme is based on the sub-exponentialhard problem of the LWE (Learning With Errors). The Q-poly made bythe adversary in the scheme, and our attribute-based authentication schemeguarantees that private data about user attributes and ciphertext cannot beobtained by malicious attackers. 展开更多
关键词 authentication learning with errors partial encryption SECURITY
在线阅读 下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
3
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
在线阅读 下载PDF
Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption
4
作者 S. J. Jereesha Mary C. Seldev Christopher S. Sebastin Antony Joe 《Circuits and Systems》 2016年第8期1722-1733,共12页
In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techni... In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security. 展开更多
关键词 WATERMARK EMRC6 LSB Content authentication encryption
在线阅读 下载PDF
Multiuser computational imaging encryption and authentication with OFDM-assisted key management
5
作者 Hongran Zeng Ping Lu +7 位作者 Xiaowei Li Lingling Huang Chaoyun Song Dahai Li In-kwon Lee Seok-Tae Kim Qiong-Hua Wang Yiguang Liu 《Advanced Photonics Nexus》 2024年第5期162-173,共12页
Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imagin... Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security. 展开更多
关键词 computational imaging optical encryption optical authentication key management
在线阅读 下载PDF
A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval
6
作者 Ronglei Hu ChuceHe +3 位作者 Sihui Liu Dong Yao Xiuying Li Xiaoyi Duan 《Computers, Materials & Continua》 2025年第7期937-956,共20页
Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To ... Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To address these problems,this paper proposes an enhanced Fully Homomorphic Encryption(FHE)algorithm based on an improved DGHV algorithm,coupled with an optimized ciphertext retrieval scheme.Our specific contributions are outlined as follows:First,we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data.Second,a triple-key encryption mechanism,which separates the data encryption key,retrieval authorization key,and retrieval key,is designed.Different keys are provided to different entities to run corresponding system functions.The key separation architecture proves particularly advantageous in multi-verifier coexistence scenarios,environments involving untrusted third-party retrieval services.Finally,the enhanced DGHV-based retrieval mechanism extends conventional functionality by enabling multi-keyword queries with similarity-ranked results,thereby significantly improving both the functionality and usability of the FHE system. 展开更多
关键词 Cloud storage homomorphic encryption ciphertext retrieval identity authentication
在线阅读 下载PDF
基于PUF的TPM架构设计与应用研究
7
作者 施江勇 高志远 +4 位作者 刘天祎 刘威 郭振斌 张咏鼎 李少青 《计算机工程与科学》 北大核心 2026年第1期51-60,共10页
现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障... 现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障。为此,提出采用物理不可克隆函数PUF作为可信根,利用PUF具有的物理不可篡改性、随机性和不可预测性等安全特性,设计并实现了基于PUF的TPM架构。此外,还针对现有研究中密钥生成算法存在的安全漏洞以及认证机制的不完善等问题进行了有效的改进,并将改进后的设计应用于可信启动验证及固件的安全更新中,从而有效提升了可信计算环境面临安全威胁的防御能力。通过BAN逻辑和协议自动化验证工具AVISPA对所提协议的安全性进行了深入分析,并在Zynq^(TM)7000系列开发板上实现了可信启动的相关实验,结果表明了所提出的方法可增强密钥生成算法的安全性,并有效降低了对引导程序和固件更新数据进行篡改等攻击的威胁。性能评估结果显示,所提协议整个认证过程平均时长仅0.06 s,展现出了其在性能上的优越性。 展开更多
关键词 加解密 PUF 可信启动 固件更新 认证协议
在线阅读 下载PDF
基于RSA的访问数据匿名签名安全认证方法
8
作者 武伟 刘宏英 曲霄红 《现代电子技术》 北大核心 2026年第4期47-51,共5页
针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法... 针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法的访问请求信息加密方法对访问请求数据进行加密,并为访问系统中每个用户角色分配RSA密钥对,公钥共享给所有成员(管理员与用户);当用户申请访问数据时,采用基于环签名的匿名认证方法,使用多个成员的公钥生成环签名,以实现对访问请求的安全匿名认证。管理员使用公钥验证匿名签名,认证通过后解密访问请求数据并授权访问。测试结果表明:所提方法使用于某风电系统后,系统仅支持访问数据匿名签名安全认证合格的用户访问;且该方法具有高效率数据加解密能力,加密过程中素数位数为90 bit时,能保证系统的抗攻击能力更强。 展开更多
关键词 匿名签名 数据加密 RSA算法 安全认证 环签名 密钥设计
在线阅读 下载PDF
环签名和IBE策略的新型电力系统匿名身份认证方案
9
作者 陈剑飞 王睿 +2 位作者 张方哲 黄华 徐光侠 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期93-99,共7页
针对现代电力系统中分布式终端数量激增、身份暴露风险高以及传统PKI密钥管理复杂等问题,提出一种融合身份加密(identity-based encryption,IBE)、环签名与零信任策略的新型分布式终端匿名身份认证方案。方案由私钥生成中心按设备身份生... 针对现代电力系统中分布式终端数量激增、身份暴露风险高以及传统PKI密钥管理复杂等问题,提出一种融合身份加密(identity-based encryption,IBE)、环签名与零信任策略的新型分布式终端匿名身份认证方案。方案由私钥生成中心按设备身份生成IBE密钥对并通过安全信道分发,简化大规模终端场景下的密钥管理;结合虚拟标识符与环签名,实现终端在环成员集合中的匿名认证;引入零信任访问控制和日志驱动的行为监测、动态权限调整及门限身份披露机制,从认证流程与访问控制两方面增强系统防护能力。形式化安全分析与性能评估结果表明,方案在保证身份匿名性、数据完整性和密钥传输安全的同时,具有较低的计算与通信开销,适用于现代电力系统分布式终端的安全接入与隐私保护需求。 展开更多
关键词 电力系统 分布式终端 基于身份的加密(IBE) 环签名 零信任策略 身份认证 匿名性
在线阅读 下载PDF
面向船舶协同指挥控制系统的多维度安全防护系统设计
10
作者 刘春 王洪磊 +1 位作者 薛婕 赵刚 《遥测遥控》 2026年第1期167-179,共13页
针对船舶协同指挥控制系统在复杂海上环境中面临的身份冒用、数据窃取、通信劫持及系统瘫痪等多元化安全挑战,本文提出一种多维纵深安全防护系统设计,该设计深度融合身份安全、数据安全、通信与接口安全、应急容灾四维防护机制,其核心... 针对船舶协同指挥控制系统在复杂海上环境中面临的身份冒用、数据窃取、通信劫持及系统瘫痪等多元化安全挑战,本文提出一种多维纵深安全防护系统设计,该设计深度融合身份安全、数据安全、通信与接口安全、应急容灾四维防护机制,其核心创新在于通过安全信息总线(SIB)实现跨维度安全信息的实时共享与策略协同联动,构建了“动态防御-主动免疫-受灾恢复”的安全闭环。通过生物特征与加密凭证多因素认证实现源头可信;依托上下文感知的数据分类与动态脱敏保障信息内容安全;采用链路与端到端加密协同及接口分级管控抵御信道与接入攻击;基于异常分级响应与热备份机制确保服务连续性。理论分析与典型应用场景验证表明,本系统能有效应对跨维度复合攻击,通过多维度协同联动显著增强了系统的整体韧性与任务可靠性,为船舶协同指挥控制系统提供了高适应性的安全保障范式。 展开更多
关键词 船舶协同指挥控制系统 多维度纵深安全防护 协同联动 安全信息总线 动态防御 动态数据脱敏 链路加密 多因素认证
在线阅读 下载PDF
基于遗传算法的电力物联网加密通信认证方法
11
作者 张奔 金祥忠 朱冠洁 《通信电源技术》 2026年第2期188-190,共3页
针对电力物联网加密通信认证中存在的全局搜索能力弱、认证效率低、密钥管理开销大等问题,提出基于遗传算法的电力物联网加密通信认证方法。通过设计适用于该场景的遗传算法,优化编码与初始化、适应度函数及算子,结合轻量级身份认证协... 针对电力物联网加密通信认证中存在的全局搜索能力弱、认证效率低、密钥管理开销大等问题,提出基于遗传算法的电力物联网加密通信认证方法。通过设计适用于该场景的遗传算法,优化编码与初始化、适应度函数及算子,结合轻量级身份认证协议与遗传算法优化的组密钥管理,实现高效、安全的加密通信认证。 展开更多
关键词 遗传算法 电力物联网 加密通信 身份认证
在线阅读 下载PDF
An Efficient Sound and Data Steganography Based Secure Authentication System 被引量:2
12
作者 Debajit Datta Lalit Garg +5 位作者 Kathiravan Srinivasan Atsushi Inoue G.Thippa Reddy M.Praveen Kumar Reddy K.Ramesh Nidal Nasser 《Computers, Materials & Continua》 SCIE EI 2021年第4期723-751,共29页
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.... The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem. 展开更多
关键词 Cyber-attacks signals PRIVACY security organization encryption DECRYPTION authentication effective communication STEGANOGRAPHY
在线阅读 下载PDF
A New Forward-Secure Authenticated Encryption Scheme with Message Linkages 被引量:1
13
作者 LI Yanping SI Guangdong WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1537-1540,共4页
Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's schem... Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's scheme also can not provide forward secrecy and confidentiality such that any adversary can easily recover the transferred message. Based on intractability of reversing the one-way hash function and discrete logarithm problem, an improved authenticated encryption scheme with messages linkage is proposed. The above security faults get solved perfectly. The new scheme is proven to satisfy all the basic security requirements of the authenticated encryption scheme. And by the concrete comparison, it has the similar efficiency of the original scheme. 展开更多
关键词 authenticated encryption scheme NON-REPUDIATION forward security
在线阅读 下载PDF
Improved High Definition Multimedia Interface Authentication Mechanism 被引量:1
14
作者 R. N. Iyare S. D. Walker 《Journal of Computer and Communications》 2014年第12期18-25,共8页
Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal ac... Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital Multimedia Interface (HDMI). In this paper, we have been able to show how cryptanalysts have conducted attacks on the HDCP protocol showing its vulnerability in protecting digital contents. Therefore, the HDCP scheme is seriously flawed and compromised. Encryption and decryption of audio/video files were implemented in both Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms by means of Python Cryptography Toolkit (Pycrypto). Security analysis such as key space analysis and statistical analysis were carried out on the encrypted image. The result of the analysis indicates that AES algorithm is secure and robust;hence the authentication and licensing of HDMI can be improved by implementing HDCP design with AES algorithm. 展开更多
关键词 SECURITY encryption Cryptanalyst authentication
在线阅读 下载PDF
IoT Services:Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption 被引量:2
15
作者 Chungen Xu Lin Mei +2 位作者 Jinxue Cheng Yu Zhao Cong Zuo 《Journal of Cyber Security》 2021年第1期55-67,共13页
With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large ... With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields,including the medical,agricultural,and industrial areas.Uploading data to the cloud solves the problem of data overhead but results in privacy issues.Therefore,the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue.In this paper,we propose a scheme that supports real-time authentication with conjunctive keyword detection(RA-CKD),this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens.Through authentication technology,connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection.Finally,we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction.The experiment shows that the efficiency of RA-CKD is good enough to be practical. 展开更多
关键词 Searchable encryption conjunctive keyword search Internet of Things authentication
暂未订购
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain 被引量:2
16
作者 Jing Liu Yixin Liu +3 位作者 Yingxu Lai Rongchen Li Siyu Wu Sami Mian 《Journal of Artificial Intelligence and Technology》 2021年第2期92-100,共9页
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use publ... With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use public key infrastructure to ensure security in accessing their data and applications.However,with the continuous development of identity-based encryption(IBE)technology,small-and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems.To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process,we propose using blockchain technology to establish a reliable cross-domain authentication scheme.Using the distributed and tamper-resistant characteristics of the blockchain,we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain.This model does not change the internal trust structure of each authentication domain and is highly scalable.Furthermore,on the premise of ensuring security,the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate,thereby improving the authentication efficiency.The developed prototype exhibits generality and simplicity compared to previous methods. 展开更多
关键词 public key infrastructure identity-based encryption cross-domain authentication blockchain
在线阅读 下载PDF
Improving Computation Efficiency of Source Authentication by Elliptic Curve Cryptosystem
17
作者 Iuon-Chang Lin Jen-Ho Yang 《Journal of Electronic Science and Technology》 CAS 2012年第3期227-231,共5页
The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic cu... The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic curve cryptosystem to design a source authentication scheme for real-time applications. The proposed scheme uses the message recovery signature to reduce the computation cost. Thus, the proposed source authentication scheme is more suitable for real-time applications, such as online meeting, online movie, and online music. 展开更多
关键词 encryption message recovery multicast real-time application source authentication.
在线阅读 下载PDF
Enhancing Multi-Factor Authentication in Modern Computing
18
作者 Ekwonwune Emmanuel Nwabueze Iwuoha Obioha Oju Onuoha 《Communications and Network》 2017年第3期172-178,共7页
Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like s... Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor;that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database. 展开更多
关键词 Enhanced Multi-Factor authentication Rapid PROTOTYPING Security THREAT encryption HACKERS PHISHING MALWARE Tokens
在线阅读 下载PDF
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
19
作者 Chunlin Xiong Zhengqiu Weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
在线阅读 下载PDF
Message Authentication with a New Quantum Hash Function
20
作者 Yalan Wang Yuling Chen +1 位作者 Haseeb Ahmad Zhanhong Wei 《Computers, Materials & Continua》 SCIE EI 2019年第5期635-648,共14页
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch... To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future. 展开更多
关键词 Message authentication symmetric encryption quantum Hash function quantum walk
在线阅读 下载PDF
上一页 1 2 56 下一页 到第
使用帮助 返回顶部