by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
In earlier multi-receiver signcryption schemes, in order to help the authorised receivers to find the corresponding information for decryption from the ciphertext, the list of identities of all authorised receivers should be included in the ciphertext as a necessary... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
Recent developments in the resource constrained devices have led to a renewed interest in designing light-weight primitives with inventive and unconventional structures. Using round-dependent constants instead of a strong key schedule is one of the most widely used... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
In this study, the authors present an efficient public-key broadcast encryption (PKBE) scheme with sub-linear size of public keys, private keys and ciphertexts and prove its adaptive security under standard assumptions. Compared with the currently best scheme of... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
The major challenge in current online social networks (OSNs) is privacy violation by OSN providers or unauthorised users. OSN providers collect unprecedented amounts of personal information for targeted advertising. Moreover, users are not able to share their social... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
In 2014, Choi proposed a security enhanced anonymous multi-server authenticated key agreement scheme using smart card and biometrics and claimed that their scheme could overcome all of securityissues in Chuang-Chen’s scheme, such as impersonation attack, smart... by NS2 Simulator Project Team | Oct 13, 2015 | Projects on Network Security
The development of kinds of mobile device is a nonlinear but in a tremendous hopping way. Thesecurity of wireless LAN is far more important, and its mainly present protection is the WPA & WPA2 protocol which is a complex tough algorithm. This exploratory study...