نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :Future Generation Comp. Syst. 2016
Xu Yang Xinyi Huang Joseph K. Liu

Various wireless communication technologies have been generated and deployed on account of mass requirements. These enable cloud computing with integration with mobility and Mobile Cloud Computing (MCC) becomes the trend of future generation computing paradigm. In this paper, we address a challenging issue of MCC technology security and privacy of the handover process. We propose a new design o...

Journal: :IACR Cryptology ePrint Archive 2011
Yalin Chen Jue-Sam Chou Cheng-Lun Wu Chi-Fong Lin

In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we use a line in a plane to represent a tag. The points on the line, which are infinite and different each other, can be used as tag identification. We also explore the scalability of the proposed sch...

2010
Kyusuk Han Kwangjo Kim Taeshik Shon

Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs only considered the static environments. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overh...

Journal: :IACR Cryptology ePrint Archive 2011
Thijs Veugen Michael Beye

Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán et al. have defined measures for the resulting loss of anonymity in the system, and approxima...

2013
Muhammad Khurram Khan Saru Kumari

The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed...

2006
Jong-Hyeon Lee

In view of their construction, digital election schemes are classified in two types. The one is based on anonymous channels and the other is based on number theoretic encryption techniques. In this paper, we present a hybrid scheme with has functions and paired chaining publication, which is a variation of anonymous channels. The Guy Fawkes Protocol supports an alternative of digital signature ...

Journal: :Internet of things 2023

The increasing popularity of wearable-based Collaborative Indoor Positioning Systems (CIPSs) has led to the development new methods for improving positioning accuracy. However, these systems often rely on protocols, such as iBeacon, that lack sufficient privacy protection. In addition, they depend centralized entities authentication and verification processes. To address limitations existing th...

Journal: :JCP 2006
Yoshio Kakizaki Hiroshi Yamamoto Hidekazu Tsuji

As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy protection has risen. When the Web services are used, they need not identify who is the user in some cases. In this paper, we propose the authentication method that achieves privacy protection with authorization witho...

2008
Khaled Ouafi Raphael C.-W. Phan

One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and untraceability: an adversary should not be able to get any information that would reveal the identity of a tag or would be u...

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Lijun Yan Huaxiong Wang Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید