Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer security (3)
- Information warfare (3)
- Business (1)
- Computation theory (1)
- Computer hackers--Case studies (1)
-
- Computer networks--Security measures (1)
- Cryptography (1)
- Digital signature schemes (1)
- Discrete logarithm problems (1)
- Electronic banking (1)
- Electronic commerce (1)
- Electronic document identification systems (1)
- ID-based (1)
- Intelligent agents (Computer software) (1)
- Internet--Security measures (1)
- Key pre-distribution (1)
- Key sharing (1)
- Knowledge management (1)
- Non-repudiation (1)
- Public key cryptography (1)
- Security (1)
- Signature Scheme (1)
- [ECUPub] (1)
- [RSTDPub] (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Physical Sciences and Mathematics
Slowstart Congestion Control For Fine-Grained Layered Multicast, Khalid Shaheen
Slowstart Congestion Control For Fine-Grained Layered Multicast, Khalid Shaheen
Archived Theses and Dissertations
No abstract provided.
Privacy Protection For Transactions Of Digital Goods, Feng Bao, Robert H. Deng
Privacy Protection For Transactions Of Digital Goods, Feng Bao, Robert H. Deng
Research Collection School Of Computing and Information Systems
In this paper we study the problem of how to protect users’ privacy in web transactions of digital goods. In particular, we introduce a system which allows a user to disclose his/her identity information (such as user account or credit card number) to a web site in exchange for a digital item, but prevents the web site from learning which specific item the user intends to obtain. The problem concerned here is orthogonal to the problem of anonymous transactions [RSG98], [RR98] but commensurate with the general problem of PIR (private information retrieval) [CGK95]
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities, D. Boneh, Xuhua Ding, Gene Tsudik, Chi Ming Wong
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities, D. Boneh, Xuhua Ding, Gene Tsudik, Chi Ming Wong
Research Collection School Of Computing and Information Systems
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) offers a number of practical advantages over current revocation techniques. Our approach simplifies validation of digital signatures and enables certificate revocation within legacy systems. It also provides immediate revocation of all security capabilities. This paper discusses both the architecture and implementation of our approach as well as performance and compatibility with the existing infrastructure. Our results show that threshold cryptography is practical for …
Generating Market Basket Data With Temporal Information, Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia
Generating Market Basket Data With Temporal Information, Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia
Research Collection School Of Computing and Information Systems
This paper presents a synthetic data generator that outputs timestamped transactional data with embedded temporal patterns controlled by a set of input parameters. In particular, calendar schema, which is determined by a hierarchy of input time granularities, is used as a framework of possible temporal patterns. An example of calendar schema is (year, month, day), which provides a framework for calendar-based temporal patterns of the form -38352 , where each is either an integer or the symbol . For example, is such a pattern, which corresponds to the time intervals consisting of all the 16th days of all months in …
Secure And Private Distribution Of Online Video And Some Related Cryptographic Issues, Feng Bao, Robert H. Deng, Peirong Bao, Yan Guo, Hongjun Wu
Secure And Private Distribution Of Online Video And Some Related Cryptographic Issues, Feng Bao, Robert H. Deng, Peirong Bao, Yan Guo, Hongjun Wu
Research Collection School Of Computing and Information Systems
With the rapid growth of broadband infrastructure, it is thought that the bottleneck for video-on-demand service through Internet is being cleared. However, digital video content protection and consumers privacy protection emerge as new major obstacles. In this paper we propose an online video distribution system with strong content security and privacy protection. We mainly focus on the study of security and privacy problems related to the system. Besides presenting the new system, we intensively discuss some relevant cryptographic issues, such as content protection, private information retrieval, super-speed encryption/decryption for video, and PKC with fast decryption etc. The paper can be …
The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey
The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey
Theses and Dissertations
Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect …
Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen
Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen
Theses and Dissertations
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the …
Modeling Information Assurance, Joseph E. Beauregard
Modeling Information Assurance, Joseph E. Beauregard
Theses and Dissertations
The ever-increasing speed of information systems allows decision-makers around the world to gather, process, and disseminate information almost instantaneously. However, with this benefit there comes a price. Information is valuable and therefore a target to those who do not have it or wish to destroy it. The Internet has allowed information to flow freely, but it has also made information vulnerable to many forms of corruption. The U. S. military controls much of the world's most sensitive information, and since it cannot sacrifice losing the speed at which this information is currently processed and disseminated, it must find a way …
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
Theses and Dissertations
Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …
An Analysis Of The Computer And Network Attack Taxonomy, Richard C. Daigle
An Analysis Of The Computer And Network Attack Taxonomy, Richard C. Daigle
Theses and Dissertations
The Air Force's dependence on the Internet continues to increase daily. However, this increased dependence comes with risks. The popularity and potential of the Internet attracts users with illegal as well as legal intentions. Since the Air Force considers the Internet an integral component of its information Operations strategy, the Air Force must be confident that it can trust the security of this component. Therefore, reliable methods and information that helps the Air Force classify the risks associated with the Internet can help the Air Force determine the best processes to assure the security of its use of this resource. …
Cryptanalysis Of Two Sparse Polynomial Based Public Key Cryptosystems, Feng Bao, Robert H. Deng, Willi Geiselmann, Claus Schnorr, Rainer Steinwandt, Hongjun Wu
Cryptanalysis Of Two Sparse Polynomial Based Public Key Cryptosystems, Feng Bao, Robert H. Deng, Willi Geiselmann, Claus Schnorr, Rainer Steinwandt, Hongjun Wu
Research Collection School Of Computing and Information Systems
The application of sparse polynomials in cryptography has been studied recently. A public key encryption scheme EnRoot [4] and an identification scheme SPIFI [1] based on sparse polynomials were proposed. In this paper, we show that both of them are insecure. The designers of SPIFI proposed the modified SPIFI [2] after Schnorr pointed out some weakness in its initial version. Unfortunately, the modified SPIFI is still insecure. The same holds for the generalization of EnRoot proposed in [2].
Cryptanalysis Of A Digital Signature Scheme On Id-Based Key-Sharing Infrastructures, Hongjun Wu, Feng Bao, Robert H. Deng
Cryptanalysis Of A Digital Signature Scheme On Id-Based Key-Sharing Infrastructures, Hongjun Wu, Feng Bao, Robert H. Deng
Research Collection School Of Computing and Information Systems
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete logarithm problem is hard to solve. Two schemes (the ID-type and the random-type schemes) based on the linear scheme for the Key Predistribution Systems (KPS) and the discrete logarithm problem (DLP) were given. In this paper we show that those two schemes fail to meet the nonrepudiation requirement: with negligible amount of computation, a signature could be forged. For the ID-type signature scheme, any verifier could forge a signature to raise repudiation between that …
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Working For Excellence In The E-Conomy: 2nd International We-B Conference, Sue Stoney (Ed.)
Research outputs pre 2011
Welcome to Perth, Western Australia, and to the 2nd International We-B Conference 2001 "working for excellence in the e-conomy" hosted by the We-B Centre, School of Management Information Systems at Edith Cowan University.
This is an international conference for academics and industry specialists in e-business, e-government and related fields. The conference has drawn participants from national and international organisations.
All submitted papers were subjected to an anonymous peer review process managed by the Conference Committee.