-
Chapter and Conference Paper
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model
One of the worst threats present in an enterprise network is the propagation of “scanning malware” (e.g., scanning worms and bots). It is important to prevent such scanning malware from spreading within an ent...
-
Chapter and Conference Paper
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. However, the length of the ciphertext depends on the numb...
-
Chapter and Conference Paper
A Selectable k-Times Relaxed Anonymous Authentication Scheme
In a k-Times Anonymous Authentication (k-TAA) scheme, Application Providers (APs) authenticates each group member in k times. A user can preserve his/her own privacy and an AP can restrict the number of used serv...
-
Chapter and Conference Paper
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root
A second-price sealed-bid auction is that a bidder who offers the highest price gets a good in the second highest price. This style of auction solves the problems of both an English auction and a first-price s...
-
Chapter and Conference Paper
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidders, and the auction manager(...
-
Chapter and Conference Paper
An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees
Some works about an electronic auction protocol have been proposed[2],[3],[4],[5],[6],[8],[11],[12]. An electronic auction protocol should satisfy the following seven properties: (a)Fair of bidders; (b)Security o...
-
Chapter and Conference Paper
User Identification System Based on Biometrics for Keystroke
In this paper, a new type of user identification system based on characteristics (biometrics) for keystroke is proposed. In this system, we do not require any special devices. We utilize two basic parameters: ...