103 research outputs found
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters
In this paper, we propose a new (t, n) threshold scheme. The scheme allows a user to divide portions of a secret among the designated group. Any t or more participants from a designated group of n members can cooperate to reconstruct the secret while (t-1) or less participants can not. Furthermore, the scheme provides an efficient mechanism to detect and identify cheaters. From the security analysis, we conclude that any participant does not have the ability to deceive other participants to obtain their portion of the secret. Therefore, this scheme is very practical for a broad spectrum of applications
An anomaly-based IDS framework using centroid-based classification
Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the commands from the bot master. Via Botnet, DDoS is an attack whose purpose is to paralyze the victim’s service. In all kinds of DDoS, SYN flood is still a problem that reduces security and availability. To enhance the security of the Internet, IDS is proposed to detect attacks and protect the server. In this paper, the concept of centroid-based classification is used to enhance performance of the framework. An anomaly-based IDS framework which combines K-means and KNN is proposed to detect SYN flood. Dimension reduction is designed to achieve visualization, and weights can adjust the occupancy ratio of each sub-feature. Therefore, this framework is also suitable for use on the modern symmetry or asymmetry architecture of information systems. With the detection by the framework proposed in this paper, the detection rate is 96.8 percent, the accuracy rate is 97.3 percent, and the false alarm rate is 1.37 percent
An efficient mutual authentication protocol for RFID systems
[[abstract]]After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made orders, and decreasing excess inventory. The paper is to explore the security issues of the RFID EPC Class 1 Generation 2. RFID transmits information wirelessly, and therefore information can be captured. In order to protect data privacy, many scholars have proposed their own ways to improve. This paper has extended the scheme of Duc et al., and made a more efficient version. © 2009 IEEE
A Perceptually Tuned Watermarking Scheme for Digital Images Using Support Vector Machines
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach
- …
