{"title":"A New Era of Cryptography : Quantum Cryptography","authors":"S. Bhandari","doi":"10.5121/IJCIS.2016.6403","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6403","url":null,"abstract":"Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure. It based on the Quantum of physics since its name which make it more secure from all other cryptography and UN breakable. In this paper about quantum cryptography i.e working, limitation and advantages discussed.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"31-37"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID","authors":"S. Sheena, S. Mathew","doi":"10.5121/ijcis.2016.6404","DOIUrl":"https://doi.org/10.5121/ijcis.2016.6404","url":null,"abstract":"Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work. For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris database is used for experimentation and fingerprint images read through the R303 fingerprint reader.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"39-46"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Algorithm for Wireless Network Communication Security","authors":"S. Ahmed, M. Nader","doi":"10.5121/IJCIS.2016.6401","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6401","url":null,"abstract":"This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"01-08"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic Degree Estimation of Block Ciphers Using Randomized Algorithm; Upper-Bound Integral Distinguisher","authors":"Haruhisa Kosuge, Hidema Tanaka","doi":"10.5121/IJCIS.2016.6402","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6402","url":null,"abstract":"Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESENT and RECTANGLE is infeasible, respectively.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"09-29"},"PeriodicalIF":1.5,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Communication","authors":"Rasha El Hajj, P. Verma, K. W. Chan","doi":"10.5121/ijcis.2016.6202","DOIUrl":"https://doi.org/10.5121/ijcis.2016.6202","url":null,"abstract":"This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"23-40"},"PeriodicalIF":1.5,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based Block Cipher","authors":"Haruhisa Kosuge, Hidema Tanaka","doi":"10.5121/IJCIS.2016.6203","DOIUrl":"https://doi.org/10.5121/IJCIS.2016.6203","url":null,"abstract":"Integral distinguisher is the main factor of integral attack. Conventionally, higher order integral distinguisher is obtained as an extension of first order integral (conventional algorithm). The algorithm was applied to many subblock-based block ciphers, however, the conventional algorithm has some problems. We find other integral distinguisher of two sub block-based block ciphers, TWINE and LBlock, which are different from the conventional evaluations. As a solution, we propose a new algorithm to search for higher order integral distinguisher. The point of a proposal algorithm is exploitation of bijective and injective components of cipher functions. Applying the proposal algorithm to TWINE and LBlock, we confirm the results of the proposal algorithm are consistent with the results which are calculated from computer experiment. The results are the optimal distinguisher and the most advantageous one for the attackers. Our proposal algorithm contributes to development of stronger block ciphers by obtaining such integral distinguisher.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"6 1","pages":"41-62"},"PeriodicalIF":1.5,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision led = vision fed","authors":"K. Martin","doi":"10.5204/ijcis.v9i2.137","DOIUrl":"https://doi.org/10.5204/ijcis.v9i2.137","url":null,"abstract":"As the National Indigenous Knowledges and Research Network (NIRAKN) reaches its completion as an entity in 2016, this paper takes up the invitation to its members to write about the key learnings, benefits and challenges experienced as a member of NIRAKN’s Indigenous Sociology, Indigenous Knowledge and Technology node. The author discusses the role of NIRAKN in progressing the scholarship of Aboriginal early childhood education through its collaborative research program, raising the bar regarding Aboriginal knowledges in higher education through its network connections and aspects for holding ground in Aboriginal research capacity building, particularly in the area of qualitative research methodologies. These discussions serve to highlight that, as the NIRAKN model has been led by a strong vision, it has fed change and achieved its visions.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-14"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping the journey of an Aboriginal research academic","authors":"R. Bainbridge","doi":"10.5204/IJCIS.V9I2.138","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.138","url":null,"abstract":"Most universities implement academic, professional development opportunities to enhance knowledge, practice appropriately to their environments and support the career progression of staff. These opportunities, however, do not cater for the specific professional development needs of Aboriginal research academics. The aim of this paper is to map the professional journey of an Aboriginal research academic during the time of her participation in the National Indigenous Researchers and Knowledges Network (NIRAKN) 2012 to 2016. The author uses an autoethnographic approach to examine what worked for her, under what conditions, through what strategies and with what consequences in her development as an Aboriginal research leader. The author suggests that the unique ‘Indigenous space’ and Aboriginal mentorship provided by NIRAKN was critical in her successful transition to a research leadership position.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-10"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Bainbridge, B. Fredericks, K. Clapham, C. Anderson, R. Ball, Marlene Longbottom, D. Bessarab, L. Collard, Mick Adams, Y. Roe, Ngare Wilkinson, C. Daniels
{"title":"Collaborating for community-engaged scholarship in health and wellbeing: A co-autoethnographic study of Indigenous self-determined researcher development","authors":"R. Bainbridge, B. Fredericks, K. Clapham, C. Anderson, R. Ball, Marlene Longbottom, D. Bessarab, L. Collard, Mick Adams, Y. Roe, Ngare Wilkinson, C. Daniels","doi":"10.5204/IJCIS.V9I2.136","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.136","url":null,"abstract":"In this article, we provide an emic perspective of being uniquely positioned as part of Australia’s only multidisciplinary Indigenous research network, the National Indigenous Research and Knowledges Network (NIRAKN). We used collaborative autoethnography and reflection in our practices and experiences. Our purpose was to better understand and improve the functionality of our research network and practice, and to offer some direction for the growth and sustainability of NIRAKN and similar networks. Our narratives strongly demonstrate that mainstream models of support for Indigenous researchers have major limitations for professional development and cultural safety, and do not meet our needs and realities. The significant message is that we need appropriately resourced exclusive spaces and must lead, develop and define the theoretical and cultural specifications and applications of Indigenous researcher support models in higher education institutions. The model should be cross-disciplinary, have national and international reach and be characterised by connectedness, cultural safety and self-determination, and be located in a resource-rich environment.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-19"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70655890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Last Blank Spaces","authors":"Greg Blyton","doi":"10.5204/IJCIS.V9I2.139","DOIUrl":"https://doi.org/10.5204/IJCIS.V9I2.139","url":null,"abstract":"Quality research, innovative and provocative. American historian Dane Kennedy’s The Last Blank Spaces: Exploring Africa and Australia delivers a carefully written comparative history of British exploration that challenges romantic conceptualisations of explorer and Indigenous relations in the nineteenth century. The very title ‘The Last Blank Spaces’ conjures up images of terra nullius. The final frontiers in British exploration of two vast continents, an emptiness “to advance imperial agendas, to pre-empt political rivals, to inspire patriotic pride, to discover natural resources, to promote commercial interests and further humanitarian objectives” (p. 60). The Last Blank Spaces fits into a genre of Indigenous, colonial ethnography when the British explorer is the central character and the Indigenous person is a support, but the book differs from conventional Western accounts. Kennedy writes that it is a book that “traces the development of exploration from an idea to a practice, from a practice to an outcome, and from an outcome to a myth” (p. 23).","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"9 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70656094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}