77 research outputs found

    An optimal probabilistic solution for information confinement, privacy, and security in RFID systems

    No full text
    In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The solution proposed requires the tag to store just a single key, thus fitting the constraints on tag's memory. Second, we provide a probabilistic tag identification scheme that requires the server to perform just bitwise operations and simple list manipulation primitives, thus speeding up the identification process. The tag identification protocol assures privacy, security and resilience to DoS attacks thanks to its stateless nature. Moreover, we extend the tag identification protocol to achieve mutual authentication and resilience to replay attacks. The proposed identification protocol, unlike other probabilistic protocols, never rejects a legitimate tag. Furthermore, the identification protocol requires the reader to access the local database (DB) of tags' keys O(n) times-where n is the number of tags in the system-while it has been shown in the literature that a privacy preserving identification protocol requires a reader to access O(n) times this DB. In this sense, our protocol is optimal. Finally, the three features suggested in this paper, namely, reader-dependent key management, tag identification, and mutual authentication, can be independently adopted to build alternative solutions. (C) 2010 Elsevier Ltd. All rights reserved

    Information confinement, privacy, and security in RFID systems

    No full text

    Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption

    No full text

    Activities of the European Union (EU) in 2011 in the tax field. 8 March 2012

    Get PDF
    Licensing is a topic of increasing importance for software publishers and users. More and more, software licensing is performed electronically by mechanisms running on the system on which the licensed software operates. In order to facilitate the use and management of such licensing systems and to enable economic software usage in enterprise-wide computer systems, various organizations are formulating requirements and defining architectures and standard interfaces for license systems

    PRISM—Privacy-Preserving Search in MapReduce.

    No full text

    Multi-Resolution Access Control Algorithm Based On Fractal Coding

    No full text
    This paper presents, a new technique for compression and secure image coding that is based on IFS. A multi-resolution access control algorithm based on the convergence control of iterative image reconstruction process is investigated. For multimedia applications an icon representation of low image quality is extracted directly from the encrypted data flow thanks to the partial self-affinity properties inherent to Local-IFS. The robustness of our scheme is due to the inherent high correlation of image data and to the non-linear decoding process

    TMSI Allocation Mechanism Using a Secure VLR Authorization in the GSM System

    No full text

    Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust

    No full text
    Abstract. This work de¯nes a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale dis-tributed systems. The scheme is composed by a protocol of mutual au-thentication, a mobile agent authenticator and a mechanism for the gen-eration of protection domain. Due to the °exibility of the SPKI/SDSI certi¯cate delegation infrastructures used, the proposed scheme provides a decentralized control for authorization and authentication.
    • …
    corecore