![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Threshold Cryptography in Mobile Ad Hoc Networks
The area of Threshold Cryptography investigates the design and analysis of protocols that distribute, in wired networks, cryptographic actions usually performed by a single party into multi-party variants, whe...
-
Chapter and Conference Paper
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way...
-
Chapter and Conference Paper
An Anonymous Authentication Scheme for Identification Card
This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...
-
Chapter and Conference Paper
A Direct Anonymous Attestation Scheme for Embedded Devices
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...
-
Chapter and Conference Paper
Louis, Lester and Pierre: Three Protocols for Location Privacy
Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider or the person’s friends, only if this re...
-
Chapter and Conference Paper
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network
Mobile Ad Hoc Network (MANET) is suitable for providing communication services in situations where no infrastructure exists. Due to the unique features of MANET, most of the applications of MANET have non-triv...
-
Chapter and Conference Paper
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...
-
Chapter and Conference Paper
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining
Privacy-preserving data mining (PPDM) primarily addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper, we explore the problem of privacy-preserving distributed ass...
-
Chapter and Conference Paper
A Robust Damage Assessment Model for Corrupted Database Systems
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database sy...
-
Chapter and Conference Paper
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechan...
-
Chapter and Conference Paper
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonym...
-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Research on Dynamic Connectivity of Urban Road Network
Connectivity of road network is an index to evaluate the rationality of urban road network planning. In the past, it was defined as the ratio of the number of edges to the number of nodes from static perspecti...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...
-
Chapter and Conference Paper
An Improved New Event Detection Model
New Event Detection (NED) aims to recognize the first story for a new event that had not been discussed before. The traditional event detection model basically adopts incremental TF-IDF weights for the terms, ...
-
Chapter and Conference Paper
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications
Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
-
Chapter and Conference Paper
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics
As data transmitted in the smart grid are fine-grained and private, the personal habits and behaviors of inhabitants may be revealed by data mining algorithms. In fact, nonintrusive appliance load monitoring (...
-
Chapter and Conference Paper
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform
Trusted computing technology can establish trust in the local computer platform by a trusted boot, and can further transfer the trust to a remote verifier through a remote attestation mechanism. However, no st...