Advances in Security, Networks, and Internet of Things
Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
Book and Conference Proceedings
Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
Chapter and Conference Paper
In this paper, we will show that the authentication protocol for roaming service proposed by Hwang-Chang is vulnerable to Denial-of-Service attack. Most important we also will show that the protocol may cause ...
Chapter and Conference Paper
Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a h...
Chapter and Conference Paper
Recently, Li, Wang, et al. proposed a secure and efficient authentication protocol which enhances scalability function by using the simple index. This study further demonstrates that their scheme could not res...
Chapter and Conference Paper
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the ...
Chapter and Conference Paper
It’s easy to access Internet resources in the cloud environment. And it’s important to protect the legal users’ privacy and confidentiality. Recently, Hou and Wang proposed a robust and efficient user authenti...
Chapter and Conference Paper
Based on the group Diffie–Hellman technique, a contributory group key exchange protocol has been proposed by Biswas. Although Biswas claimed the protocol belongs to a contributory group key exchange, Tseng and...
Chapter and Conference Paper
In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through...
Chapter and Conference Paper
The user authentication scheme has been widely applied to verify the users’ legality. In order to enhance the security, the smart card has widely used in an authentication scheme. Recently, Liu et al. shown th...
Chapter and Conference Paper
With the prevalence of Internet, eLearning provides a platform for education that enables students to take classes online. While eLearning provides a flexible learning environment, it also has drawbacks. This...
Chapter and Conference Paper
In recent times, Wei et al. proposed a secure smart card based on remote user password authentication scheme. Their scheme is more secure than other schemes. In this article, we will prove their scheme is vul...
Article
Many protocols have been proposed for solving the user authentication in portable communication system. One of the schemes is based on the delegation concept. Home Location Register (HLR) delegates Mobile Stat...
Article
The access control begins to be widely discussed, especially in organizations and systems with a hierarchical structure. In such a hierarchy, users and their information items divide into a number of disjointe...
Chapter and Conference Paper
Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schem...
Article
This paper proposes a simple method that equips UMTS-based telecom companies with a mechanism to prove the records on mobile users’ phone bills. In the history of mobile phone communication, we have seen count...
Article
The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS) in the re...
Article
As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobil...
Chapter and Conference Paper
The Internet Engineering Task Force (IETF) Mobile IP working group has proposed the Mobile IP to support that an MH has the ability of roaming around a foreign domain. However, when it roams around a foreign d...
Article
The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in comm...