Sciweavers

IJNSEC
2008
115views more  IJNSEC 2008»
13 years 11 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
IJNSEC
2008
119views more  IJNSEC 2008»
13 years 11 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 11 months ago
A New General Transparency Model for Block-based Watermarking Method
Blocking artifact is one of the main drawbacks of the block-based watermarking method. Though a number of researches on "transparent" digital watermarking system have be...
Fangjun Huang
IJNSEC
2008
120views more  IJNSEC 2008»
13 years 11 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu
IJNSEC
2008
135views more  IJNSEC 2008»
13 years 11 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
IJNSEC
2008
175views more  IJNSEC 2008»
13 years 11 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 11 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 11 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 11 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
IJNSEC
2008
92views more  IJNSEC 2008»
13 years 11 months ago
Re-visiting the One-Time Pad
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system (One-Time Pad or OTP). It has generally been believed that the perfectly random and uncompressible O...
Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya