The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose a remote password authentication scheme based on a circle. This scheme is simple and practically feasible in a multi-server environment. In this scheme, we use some simple tangent theorem like secant tangent theorem and a strong one way function to authenticate the user and the server. Furthermore, a legal user can freely choose and change his password using his smart card...
An advanced threshold secret sharing scheme to identify cheaters is proposed in this paper by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect cheating of some valid shareholders. In particular one honest shareholder is able to detect...
A key assignment scheme for a secure group communication system based on a geometric approach is proposed. Members obtain the group key by solving multiple linear equations, using both the public information on the notice board and the secret information of their own. The proposed scheme can be divided into three phases: user registration, group key assignment, and group key computation. In the user...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
By using of chaotic map and block-wise independent technology, a new chaotic fragile watermarking algorithm is proposed in this paper. Firstly, location key is looked as logistic chaotic initial value to iterate and create location matrix, according to this matrix we can generate mapping image and identify the embedding location of watermarking in image blocks. Then watermarking sequence related with...
Recently, Yang et al. proposed an improvement of two password authentication schemes based on timestamp and nonce. They claimed that their schemes are secure against different kind of attacks. However, we point out that their schemes are vulnerable and can easily be cryptanalyzed. We demonstrate that their schemes perform unilateral authentication (only client authentication) and there is no mutual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.