Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Sciences

Efficient And Secure Digital Signature Algorithm (Dsa), Nissa Mehibel, M'Hamed Hamadouche Aug 2023

Efficient And Secure Digital Signature Algorithm (Dsa), Nissa Mehibel, M'Hamed Hamadouche

Emirates Journal for Engineering Research

The digital signature is used to ensure the integrity of messages as well as the authentication and non-repudiation of users. Today it has a very important role in information security. Digital signature is used in various fields such as e-commerce and e-voting, health, internet of things (IOT). Many digital signature schemes have been proposed, depending on the computational cost and security level. In this paper, we analyzed a recently proposed digital signature scheme based on the discrete logarithm problem (DLP). Our analysis shows that the scheme is not secure against the repeated random number attack to determine the secret keys …


Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden Mar 2023

Using Probabilistic Context-Free Grammar To Create Password Guessing Models, Isabelle Hjelden

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper will discuss two versions of probabilistic context-free grammar password-guessing models. The first model focuses on using English semantics to break down passwords and identify patterns. The second model identifies repeating chunks in passwords and uses this information to create possible passwords. Then, we will show the performance of each model on leaked password databases, and finally discuss the observations made on these tests.


Single Sign-On Model Based On Trusted-Daa Connection, Xiaohui Yang, Lijun Jiang, Wang Hong, Siyuan Chang Jul 2020

Single Sign-On Model Based On Trusted-Daa Connection, Xiaohui Yang, Lijun Jiang, Wang Hong, Siyuan Chang

Journal of System Simulation

Abstract: Traditional single sign-on (SSO) models adopt SSL connections in the cloud computing environments, while there exist several problems such as certificates cannot be updated in time, certificate updating needs a third party CA, etc.. To solve above problems, TPM was introduced between cloud identity providers and cloud service providers, and a trusted DAA connection (T-D-SSL) was designed by adopting the DAA authentication method to implementation cross platform trusted authentication, secure channel establishment, and certificate updating operation. Combining with T-D-SSL, SAML2.0, and ID-FF1.2, a new SSO model of the cloud computing environments was proposed, which could make sure the system …


Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado Jan 2019

Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, a watermarking framework to authenticate and protect the copyright that prevents the visualization of nonauthorized anaglyph images is proposed. Designed scheme embeds a binary watermark and the Blue channel of the anaglyph image into the discrete cosine transform domain of the original image. The proposed method applies the quantization index modulation-dither modulation algorithm and a combination of Bose-Chaudhuri-Hocquenghem with repetition codes, which permit to increase the capability in recovering the watermark. Additionally, Hash algorithm is used to scramble the component where the watermark should be embedding, guaranteeing a higher security performance of the scheme. This new technique …


Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru Jan 2019

Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru

Turkish Journal of Electrical Engineering and Computer Sciences

There are many marketing methods used to attract customers' attention and customers search for special discounts and conduct research to get products cheaper. Using discount coupons is one of the widely used methods for obtaining discounts. With the development of technology, classical paper-based discount coupons become e-coupons and then turn into mobile coupons (m-coupons). It is inevitable that retailers will use m-coupon technology to attract customers while mobile devices are used in daily life. As a result, m-coupon technology is a promising technology. One of the significant problems with using m-coupons is security. Here it is necessary to ensure the …


Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu Jan 2017

Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays the fields in which machine-to-machine (M2M) applications are used and the numbers of M2M devices and users are increasing gradually. In an M2M application, M2M platforms are used in order to follow and analyze the data presented by M2M devices. The communication of multiple users and devices via an M2M platform causes some problems in terms of security. In this study, an M2M platform has been developed by using RestFul web services and NoSQL database. On this platform a token-based authentication method was used for multiple users and devices. In this method, an authorized request approach was adopted for …


An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao Jan 2016

An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao

Turkish Journal of Electrical Engineering and Computer Sciences

Web service-based application has become one of the dominative ones of the Internet. This trend brings more and more security challenges in reliability, confidentiality, and data nonrepudiation, especially in some systems that have massive diversified resources. An improved framework for secure accesses of Web resources is presented and implemented by extending and enhancing the Spring Security framework. It improves the security level of systems for identity authentication, authorized access, and secure transmission. The highly safe authentication is based on the integration of an improved authentication module of Spring Security with a U-key method and a RSA algorithm. For authorized access, …


Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem Jan 2016

Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


Efficient Id-Based Authentication And Key Agreement Protocols For The Session Initiation Protocol, Haci Hakan Kilinç, Yolguly Allaberdiyev, Tuğrul Yanik, Serdar Süer Erdem Jan 2015

Efficient Id-Based Authentication And Key Agreement Protocols For The Session Initiation Protocol, Haci Hakan Kilinç, Yolguly Allaberdiyev, Tuğrul Yanik, Serdar Süer Erdem

Turkish Journal of Electrical Engineering and Computer Sciences

In a widely deployed VoIP system tens of thousands of clients compete for the SIP proxy server's authentication service. SIP protocol implementations have to meet certain QoS and security requirements. In this study new ID-based protocols are proposed for the SIP authentication and key agreement protocols. These protocols minimize the use of expensive pairing functions but still resist notable attacks. The security of the proposed protocols are analyzed and demonstrated with security proofs based on the BJM security model. Finally, the performance overhead of the proposed protocols are compared to ID-based SIP authentication and key agreement protocols given in the …


Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling Jan 2014

Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling

Journal of Digital Forensics, Security and Law

Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics


Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe Apr 2013

Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe

The African Journal of Information Systems

The inefficiencies of current intrusion detection system against fraudulent cyber activities attracts the attention of computer gurus, also known as “hackers” to exploit known weakness on a particular host or network. These hackers are expert programmers who mainly focus on how the Internet works, and they interact with each other to know its strengths and weaknesses. Then they develop advanced tools which an average attacker with little background can use to know the liveness, reachability and running service on the network. Once an attacker identifies these details, he can accurately launch an effective attack and get maximum benefit out of …


Remote Mutual Authentication And Key Agreement Scheme Based On Elliptic Curve Cryptosystem, Eunjun Yoon Jan 2011

Remote Mutual Authentication And Key Agreement Scheme Based On Elliptic Curve Cryptosystem, Eunjun Yoon

Turkish Journal of Electrical Engineering and Computer Sciences

Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this paper demonstrates that Shieh-Wang's scheme still does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack. We also present an improved scheme based on the Elliptic Curve Diffie-Hellman problem (ECDHP) and secure one-way hash function, in order to isolate such …


Improving The Security And Flexibility Of One-Time Passwords By Signature Chains, Kemal Biçakci, Nazi̇fe Baykal Jan 2003

Improving The Security And Flexibility Of One-Time Passwords By Signature Chains, Kemal Biçakci, Nazi̇fe Baykal

Turkish Journal of Electrical Engineering and Computer Sciences

While the classical attack of ``monitor the network and intercept the password'' can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supplement for software authentication since they are the only ones that safeguard against attacks on insecure client machines. In this paper by using public-key techniques we present a method called signature chain alternative to Lamport's hash chain to improve security and flexibility of one-time passwords. Our proposition improves the security because first, like other public-key authentication protocols, the server and the user do not share a secret, thereby eliminating attacks …