103 research outputs found

    A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters

    Get PDF
    In this paper, we propose a new (t, n) threshold scheme. The scheme allows a user to divide portions of a secret among the designated group. Any t or more participants from a designated group of n members can cooperate to reconstruct the secret while (t-1) or less participants can not. Furthermore, the scheme provides an efficient mechanism to detect and identify cheaters. From the security analysis, we conclude that any participant does not have the ability to deceive other participants to obtain their portion of the secret. Therefore, this scheme is very practical for a broad spectrum of applications

    An anomaly-based IDS framework using centroid-based classification

    Get PDF
    Botnet is an urgent problem that will reduce the security and availability of the network. When the bot master launches attacks to certain victims, the infected users are awakened, and attacks start according to the commands from the bot master. Via Botnet, DDoS is an attack whose purpose is to paralyze the victim’s service. In all kinds of DDoS, SYN flood is still a problem that reduces security and availability. To enhance the security of the Internet, IDS is proposed to detect attacks and protect the server. In this paper, the concept of centroid-based classification is used to enhance performance of the framework. An anomaly-based IDS framework which combines K-means and KNN is proposed to detect SYN flood. Dimension reduction is designed to achieve visualization, and weights can adjust the occupancy ratio of each sub-feature. Therefore, this framework is also suitable for use on the modern symmetry or asymmetry architecture of information systems. With the detection by the framework proposed in this paper, the detection rate is 96.8 percent, the accuracy rate is 97.3 percent, and the false alarm rate is 1.37 percent

    An efficient mutual authentication protocol for RFID systems

    No full text
    [[abstract]]After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made orders, and decreasing excess inventory. The paper is to explore the security issues of the RFID EPC Class 1 Generation 2. RFID transmits information wirelessly, and therefore information can be captured. In order to protect data privacy, many scholars have proposed their own ways to improve. This paper has extended the scheme of Duc et al., and made a more efficient version. © 2009 IEEE

    Robust Image Watermarking Systems Using Neural Networks

    No full text

    ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS

    No full text

    Cryptanalysis of the Improved User Efficient Blind Signatures

    No full text
    corecore