Sciweavers

IJNSEC
2006
110views more  IJNSEC 2006»
13 years 11 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 11 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 11 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 11 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
IJNSEC
2006
131views more  IJNSEC 2006»
13 years 11 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 11 months ago
Security Analysis of Some Batch Verifying Signatures from Pairings
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from...
Tianjie Cao, Dongdai Lin, Rui Xue
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 11 months ago
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent a...
Sahadeo Padhye, Birendra Kumar Sharma
IJNSEC
2006
71views more  IJNSEC 2006»
13 years 11 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 11 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo