Journal of Information Security Research最新文献

筛选
英文 中文
Security Management and Prevention on the Campus Network against Hacking 校园网的安全管理与防范
Journal of Information Security Research Pub Date : 2019-09-01 DOI: 10.6025/jisr/2019/10/3/87-91
Xue-rui Wang, Yong-qiang He
{"title":"Security Management and Prevention on the Campus Network against Hacking","authors":"Xue-rui Wang, Yong-qiang He","doi":"10.6025/jisr/2019/10/3/87-91","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/87-91","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Digital Resources Integration Model in Cloud Computing Environment 云计算环境下数字资源集成模型研究
Journal of Information Security Research Pub Date : 2019-09-01 DOI: 10.6025/jisr/2019/10/3/92-96
Yingjun Han
{"title":"Research on Digital Resources Integration Model in Cloud Computing Environment","authors":"Yingjun Han","doi":"10.6025/jisr/2019/10/3/92-96","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/92-96","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reduced Feature Representation based Online Signature Authentication 基于简化特征表示的在线签名认证
Journal of Information Security Research Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/39-47
Y. Elmir, Nasreddine Karour, Souleymane Ouled Jaafri
{"title":"A Reduced Feature Representation based Online Signature Authentication","authors":"Y. Elmir, Nasreddine Karour, Souleymane Ouled Jaafri","doi":"10.6025/JISR/2019/10/2/39-47","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/39-47","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data and Programming Security Issues in Fog Computing 雾计算中的数据和编程安全问题
Journal of Information Security Research Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/67-76
P. Vyas, D. Patel
{"title":"Data and Programming Security Issues in Fog Computing","authors":"P. Vyas, D. Patel","doi":"10.6025/JISR/2019/10/2/67-76","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/67-76","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keystroke Latency Time Discrete Representation for Password Hardening 密码加固的击键延迟时间离散表示
Journal of Information Security Research Pub Date : 2019-06-01 DOI: 10.6025/JISR/2019/10/2/48-66
Khalid Mansour, Khaled W. Mahmoud
{"title":"Keystroke Latency Time Discrete Representation for Password Hardening","authors":"Khalid Mansour, Khaled W. Mahmoud","doi":"10.6025/JISR/2019/10/2/48-66","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/48-66","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128512529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Chaotic Quantum based Homomorphic CPABE Authentication Protocol against Malicious attack in Wireless Communication Networks 一种新的基于混沌量子的无线通信网络中抗恶意攻击的同态CPABE认证协议
Journal of Information Security Research Pub Date : 2019-03-01 DOI: 10.6025/JISR/2019/10/1/1-17
B. Madhuravani, Murthy Dsr
{"title":"A Novel Chaotic Quantum based Homomorphic CPABE Authentication Protocol against Malicious attack in Wireless Communication Networks","authors":"B. Madhuravani, Murthy Dsr","doi":"10.6025/JISR/2019/10/1/1-17","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/1/1-17","url":null,"abstract":"With the exponential growth of network bandwidth and computational resources, data security has become one of the interesting research area in wireless communication networks. Authentication is considered as a prime concern in the field of energy-constrained wireless sensor networks due to its wide domain applications. Extensive amount of research works have been carried out to develop more secure authentication system in order to achieve confidentiality and authenticity constraints. Many authentication protocols are mainly depend upon security, scalability, communication constraints and computation overhead. Also, most of the traditional authentication models are failed to authenticate node behavior using integrity, secured key distribution and encryption models. Therefore, there is requirement of very strong authentication protocols in order to provide extended security to the WSN systems. To overcome these issues, a novel quantum chaotic key distribution (QKD) based homomorphic CPABE model was implemented in wireless communication networks. Quantum key Distribution (QKD) is required to improve the security of communication systems. The major objective of quantum key distribution is to generate a key that takes part in encryption. Experimental results proved that the proposed model has high computation speed, storage overhead and secured key distribution compared to traditional wireless authentication models.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Authentication of Significant security for accessing Password through Network System 通过网络系统访问密码的重要安全认证
Journal of Information Security Research Pub Date : 2019-03-01 DOI: 10.6025/jisr/2019/10/1/18-23
Syed Umar
{"title":"An Authentication of Significant security for accessing Password through Network System","authors":"Syed Umar","doi":"10.6025/jisr/2019/10/1/18-23","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/1/18-23","url":null,"abstract":"Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user's password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection using Sub-Signatures and Machine Learning Technique 基于子签名和机器学习技术的恶意软件检测
Journal of Information Security Research Pub Date : 2018-09-01 DOI: 10.6025/JISR/2018/9/3/96-106
B. Khammas
{"title":"Malware Detection using Sub-Signatures and Machine Learning Technique","authors":"B. Khammas","doi":"10.6025/JISR/2018/9/3/96-106","DOIUrl":"https://doi.org/10.6025/JISR/2018/9/3/96-106","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Homomorphic Encryption based on Euler’s Theorem 基于欧拉定理的全同态加密
Journal of Information Security Research Pub Date : 2018-09-01 DOI: 10.6025/jisr/2018/9/3/83-95
Sarah Shihab Hamad, A. Sagheer
{"title":"Fully Homomorphic Encryption based on Euler’s Theorem","authors":"Sarah Shihab Hamad, A. Sagheer","doi":"10.6025/jisr/2018/9/3/83-95","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/83-95","url":null,"abstract":"Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private data and modifies the information to make it beneficial to him. Therefore, the security becomes the main thing in cloud computing. The scheme that allows to executing several computations on the encrypted message without decrypting the message is called homomorphic encryption. This paper provides a Fully Homomorphic Encryption Scheme SA that we can apply it for security of a cloud computing. The proposed scheme is based on Euler’s theorem, which proved both addition and multiplication operations at the same time on ciphertext without decryption. We compute the time complexity of the encryption and decryption function for the Elgamal and RSA cryptosystems compared to the proposed SA scheme and also compared the execution time among the three schemes with varies sizes of messages and varies lengths of secret key, and finally the security of the three schemes is analyzed. As a result, in calculations of the execution time of ElGamal and RSA cryptosystems compared to the proposed SA scheme, it was observed that the length of the secret key effect on the execution time, in which the execution time increased when the length of the private key was increased. The proposed scheme showed a good security for the stored data on the cloud.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT 物联网中天坑和选择性转发攻击的发现方法
Journal of Information Security Research Pub Date : 2018-09-01 DOI: 10.6025/jisr/2018/9/3/107-118
Atena Shiranzaei, R. Khan
{"title":"An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT","authors":"Atena Shiranzaei, R. Khan","doi":"10.6025/jisr/2018/9/3/107-118","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/107-118","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信