Sciweavers

IJNSEC
2008
110views more  IJNSEC 2008»
13 years 10 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 10 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
IJNSEC
2008
166views more  IJNSEC 2008»
13 years 10 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 10 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
IJNSEC
2008
128views more  IJNSEC 2008»
13 years 10 months ago
Attacking LCCC Batch Verification of RSA Signatures
Batch verification of digital signatures is used to improve the computational complexity when a large number of digital signatures must be verified. Lee at al. [2] proposed a new ...
Martin Stanek
IJNSEC
2008
107views more  IJNSEC 2008»
13 years 10 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 10 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
IJNSEC
2008
66views more  IJNSEC 2008»
13 years 10 months ago
Improving the Novikov and Kiselev User Authentication Scheme
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-K...
Min-Ho Kim, Çetin Kaya Koç
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 10 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
IJNSEC
2008
109views more  IJNSEC 2008»
13 years 10 months ago
A Multi-band Wavelet Watermarking Scheme
This paper presents a new multi-band wavelet watermarking scheme. Compared with conventional watermarking schemes implemented in two-band wavelet domain, by incorporating the prin...
Xiangui Kang, Wenjun Zeng, Jiwu Huang