by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
Symbolic execution is one of the most important computational intelligence methods in vulnerability detection, delivering high code coverage. The bottleneck of dynamic symbolic execution is its running speed, and few existing works focus on research of the problem. In... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
In earlier multi-receiver signcryption schemes, in order to help the authorised receivers to find the corresponding information for decryption from the ciphertext, the list of identities of all authorised receivers should be included in the ciphertext as a necessary... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
Recent developments in the resource constrained devices have led to a renewed interest in designing light-weight primitives with inventive and unconventional structures. Using round-dependent constants instead of a strong key schedule is one of the most widely used... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
In this study, the authors present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear size of public keys, private keys and ciphertexts and prove its adaptive security under standard assumptions. Compared with the currently best scheme of... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
The major challenge in current online social networks (OSNs) is privacy violation by OSN providers or unauthorised users. OSN providers collect unprecedented amounts of personal information for targeted advertising. Moreover, users are not able to share their social...