![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
User Oriented IP Accounting in Multi-User Systems
The traditional IP accounting method is IP address oriented, that means one IP address corresponds to one user, but it can not meet the finer granularity accounting requirement in multi-user systems, in which ...
-
Chapter and Conference Paper
A Design for Parameterized Roles
Role-based access control eases the management of access control in cases where there are large numbers of objects and users. Roles provide certain access to specific data objects. In order to handle a very la...
-
Chapter and Conference Paper
On Dynamic Subset Difference Revocation Scheme
Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message overhead when the number of curr...
-
Chapter and Conference Paper
An Anonymous Authentication Scheme for Identification Card
This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity. Anonymous identification card can be ...
-
Chapter and Conference Paper
A Direct Anonymous Attestation Scheme for Embedded Devices
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construct...
-
Chapter and Conference Paper
Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites
Web services selection aims to choose an appropriate web service among a number of service candidates. The trustworthiness of web services is an important metric for web services selection. Many trustworthines...
-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies
According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
-
Chapter and Conference Paper
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against im...
-
Chapter and Conference Paper
Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups
This paper present an identity-based encryption (IBE) scheme with full security in prime order bilinear groups by using dual pairing vector space. The security of our scheme is based upon decisional linear and...