scispace - formally typeset
Journal ArticleDOI

Insight of the protection for data security under selective opening attacks

TLDR
This paper formalizes the security notion of non-malleability under selective opening attacks (NM-SO security), and explores the relations between NM-SOSecurity and the standard SOA security, the relations among NM-so security notions, and the relations amongst NM- SO security notions.
About
This article is published in Information Sciences.The article was published on 2017-10-01. It has received 147 citations till now. The article focuses on the topics: Cloud computing security & Computer security model.

read more

Citations
More filters
Journal ArticleDOI

A self-feedback strategy differential evolution with fitness landscape analysis

TL;DR: A new self-feedback strategy differential evolution (SFSDE) algorithm based on fitness landscape analysis of single-objective optimization problem and exhibits high accuracy and rapid convergence and can be widely used in the parameter estimation of such nonlinear optimization models.
Posted Content

Adaptive DDoS attack detection method based on multiple-kernel learning

TL;DR: An adaptive DDoS attack detection method (ADADM) based on multiple-kernel learning (MKL) is proposed that can detect DDoS attacks early and accurately.
Journal ArticleDOI

A chaos based image steganographic system

TL;DR: This approach can be used to provide an additional layer of protection to any system that communicates important data/information through any kind of globally accessed medium and serves its purpose of providing seamless security between sender and receiver without producing any distortion in the images.
Journal ArticleDOI

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage

TL;DR: A new architecture to resist inside keyword-guessing attacks is constructed and an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture is presented, which is effective for the retrieval of encrypted data in cloud computing.
Journal ArticleDOI

Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).

TL;DR: A novel dissimilarity metric based on local neighboring information and a genetic programming approach for efficient data dissemination in Vehicular Ad Hoc Networks (VANETs) achieves significant improvements in terms of reachability in comparison with the classical Dissimilarity metrics and the Euclidean metric-based schemes in the studied VANET urban scenarios.
References
More filters
Book ChapterDOI

A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack

TL;DR: In this paper, a new public key cryptosystem is proposed and analyzed, which is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. But the scheme is quite practical, and is not provable to be used in practice.
Journal Article

A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

TL;DR: In this article, a new public key cryptosystem is proposed and analyzed, which is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions. But the scheme is quite practical, and is not provable to be used in practice.
Proceedings ArticleDOI

Public-key cryptosystems provably secure against chosen ciphertext attacks

Moni Naor, +1 more
TL;DR: This work shows how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given aPublic-Key cryptosystern secure against passive eavesdropping and a noninteractive zero-knowledge proof system in the shared string model.
Book ChapterDOI

Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack

TL;DR: A formalization of chosen ciphertext attack is given in the model which is stronger than the "lunchtime attack" considered by Naor and Yung, and it is proved a non-interactive public-key cryptosystem based on non-Interactive zero-knowledge proof of knowledge to be secure against it.
Proceedings ArticleDOI

Non-malleable cryptography

TL;DR: Non-malleable schemes for each of the contexts of string commitment and zero-knowledge proofs of possession of knowledge, where a user need not know anything about the number or identity of other system users are presented.
Related Papers (5)