Journal ArticleDOI
Insight of the protection for data security under selective opening attacks
TLDR
This paper formalizes the security notion of non-malleability under selective opening attacks (NM-SO security), and explores the relations between NM-SOSecurity and the standard SOA security, the relations among NM-so security notions, and the relations amongst NM- SO security notions.About:
This article is published in Information Sciences.The article was published on 2017-10-01. It has received 147 citations till now. The article focuses on the topics: Cloud computing security & Computer security model.read more
Citations
More filters
Journal ArticleDOI
A self-feedback strategy differential evolution with fitness landscape analysis
TL;DR: A new self-feedback strategy differential evolution (SFSDE) algorithm based on fitness landscape analysis of single-objective optimization problem and exhibits high accuracy and rapid convergence and can be widely used in the parameter estimation of such nonlinear optimization models.
Posted Content
Adaptive DDoS attack detection method based on multiple-kernel learning
TL;DR: An adaptive DDoS attack detection method (ADADM) based on multiple-kernel learning (MKL) is proposed that can detect DDoS attacks early and accurately.
Journal ArticleDOI
A chaos based image steganographic system
Srilekha Mukherjee,Goutam Sanyal +1 more
TL;DR: This approach can be used to provide an additional layer of protection to any system that communicates important data/information through any kind of globally accessed medium and serves its purpose of providing seamless security between sender and receiver without producing any distortion in the images.
Journal ArticleDOI
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
TL;DR: A new architecture to resist inside keyword-guessing attacks is constructed and an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture is presented, which is effective for the retrieval of encrypted data in cloud computing.
Journal ArticleDOI
Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).
TL;DR: A novel dissimilarity metric based on local neighboring information and a genetic programming approach for efficient data dissemination in Vehicular Ad Hoc Networks (VANETs) achieves significant improvements in terms of reachability in comparison with the classical Dissimilarity metrics and the Euclidean metric-based schemes in the studied VANET urban scenarios.
References
More filters
Book ChapterDOI
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
Ronald Cramer,Victor Shoup +1 more
TL;DR: In this paper, a new public key cryptosystem is proposed and analyzed, which is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. But the scheme is quite practical, and is not provable to be used in practice.
Journal Article
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer,Victor Shoup +1 more
TL;DR: In this article, a new public key cryptosystem is proposed and analyzed, which is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. But the scheme is quite practical, and is not provable to be used in practice.
Proceedings ArticleDOI
Public-key cryptosystems provably secure against chosen ciphertext attacks
Moni Naor,Moti Yung +1 more
TL;DR: This work shows how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given aPublic-Key cryptosystern secure against passive eavesdropping and a noninteractive zero-knowledge proof system in the shared string model.
Book ChapterDOI
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
Charles Rackoff,Daniel R. Simon +1 more
TL;DR: A formalization of chosen ciphertext attack is given in the model which is stronger than the "lunchtime attack" considered by Naor and Yung, and it is proved a non-interactive public-key cryptosystem based on non-Interactive zero-knowledge proof of knowledge to be secure against it.
Proceedings ArticleDOI
Non-malleable cryptography
TL;DR: Non-malleable schemes for each of the contexts of string commitment and zero-knowledge proofs of possession of knowledge, where a user need not know anything about the number or identity of other system users are presented.