{"title":"PEC - An Alternate and More Efficient Public Key Cryptosystem","authors":"R. Krishnan","doi":"10.5121/ijcis.2018.8101","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8101","url":null,"abstract":"In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x−D ∗y ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem computing the private key from the public key in PEC is at least as hard as that of ECC.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"8 1","pages":"01-15"},"PeriodicalIF":1.5,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70619928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Service Provisioning and Selection for Satisfying Cloud Applications and Cloud Providers in Hybrid Cloud","authors":"Xu Lijun, L. Chunlin","doi":"10.1142/S0218843017500058","DOIUrl":"https://doi.org/10.1142/S0218843017500058","url":null,"abstract":"The paper presents a hybrid cloud service provisioning and selection optimization scheme, and proposes a hybrid cloud model which consists of hybrid cloud users, private cloud and public cloud. This scheme aims to effectively provide cloud service and allocate cloud resources, such that the system utility can be maximized subject to public cloud resource constraints and hybrid cloud users constraints. The paper makes use of a utility-driven approach to solve interaction among private cloud user, hybrid cloud service provider and public cloud provider in hybrid cloud environment. The paper presents hybrid cloud service provisioning and selection algorithm in hybrid cloud. The hybrid cloud market consists of hybrid cloud user agent, hybrid cloud service agent and hybrid cloud agent, which represent the interests of different roles. The experiments are designed to compare the performance of proposed algorithm with the other related work.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"26 1","pages":"1750005"},"PeriodicalIF":1.5,"publicationDate":"2017-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0218843017500058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raphael Nyirongo, Solomon Kuonga, Patrick Ali, L. Eneya, Hyunsung Kim
{"title":"Cryptanalysis And Enhancement Of Password Authentication Scheme For Smart Card","authors":"Raphael Nyirongo, Solomon Kuonga, Patrick Ali, L. Eneya, Hyunsung Kim","doi":"10.5281/ZENODO.1161879","DOIUrl":"https://doi.org/10.5281/ZENODO.1161879","url":null,"abstract":"ABSTRACT\u0000\u0000Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"7 1","pages":"01-13"},"PeriodicalIF":1.5,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49210063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Trojan Identification and Detection","authors":"Samer Moein, F. Gebali, T. Gulliver, A. Alkandari","doi":"10.5121/IJCIS.2017.7201","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7201","url":null,"abstract":"","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"7 1","pages":"1-20"},"PeriodicalIF":1.5,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44315053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomization Based Block Cipher with Key Mapped S-Box Selection","authors":"Krishna Prasad Nandeti, Anshuman Singh, M. Yousef","doi":"10.5121/IJCIS.2017.7101","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7101","url":null,"abstract":"This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the SubstitutionPermutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"7 1","pages":"1-8"},"PeriodicalIF":1.5,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41686923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Attack Mitigation Techniques Analysis","authors":"Samer Moein, T. Gulliver, F. Gebali, A. Alkandari","doi":"10.5121/IJCIS.2017.7102","DOIUrl":"https://doi.org/10.5121/IJCIS.2017.7102","url":null,"abstract":"The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In this paper, a comprehensive survey of hardware attack mitigation techniques is presented. These techniques are matched to the hardware attacks and attack criteria they can counter, which helps security personnel choose appropriate mitigation techniques to protect their systems against hardware attacks. An example is presented to illustrate the choice of appropriate countermeasures.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"7 1","pages":"9-28"},"PeriodicalIF":1.5,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47989575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Respecting and recognising Indigenous rights when challenged by commercial activities","authors":"Valmaine Toki","doi":"10.5204/IJCIS.V10I1.147","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.147","url":null,"abstract":"The United Nations Declaration on the Rights of Indigenous Peoples was hailed as a triumph among Indigenous peoples, signalling a long-awaited recognition of their fundamental human rights. Despite this, many violations of these basic rights continue, particularly in relation to extractive industries and business activities. In response, a business reference guide seeks to inform industries of their responsibilities. This article examines the tenuous relationship between Indigenous rights, state responsibilities and business expectations.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"10 1","pages":"1-17"},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“And There'll Be NO Dancing”. Perspectives on Policies Impacting Indigenous Australia Since 2007","authors":"O. Haag","doi":"10.5204/IJCIS.V10I1.150","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.150","url":null,"abstract":"“Sexual abuse of children is inexcusable. So why is there such a fuss about a state intervention? Should we shut up and do nothing just because there is racism? No child or woman must be molested, irrespective of who the perpetrator is!” Thus my recollection of what one of my Scottish colleagues said in an informal conversation about the 2007 Northern Territory Intervention, a set of legal and political measures intended to curtail domestic violence in Indigenous Australian communities. “Yes”, I replied, “race should not be an issue when talking about crime”. Not least because domestic violence happens everywhere, including Scotland. I would not have heard anyone talking about a specifically Scottish, White or European propensity for domestic violence. Yet there is abundant talk about Black violence. Generalisation is the hallmark of racialisation. Blackness is scripted as inherently violent—a tenacious trope deriving from colonial concepts of ferocious animalism (e.g. Eze 2000; Nederveen-Pieterse 1990).","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"10 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Textbooks for the teaching of te reo Māori","authors":"Sophie Nock","doi":"10.5204/IJCIS.V10I1.149","DOIUrl":"https://doi.org/10.5204/IJCIS.V10I1.149","url":null,"abstract":"As part of a recent study of the teaching and learning of te reo Māori (the Māori language) in English-medium secondary schools in Aotearoa/New Zealand, I asked a sample of teachers which textbooks they used. I then analysed some of those textbooks that were referred to most often, using focus points derived from a review of literature on the design of textbooks for the teaching of additional languages. What I found was that the textbooks analysed were inconsistent with the relevant curriculum guidelines document and were also problematic in a number of other ways. This article discusses a number of the problematic concerns and outlines what would be involved in designing more effective textbooks for Indigenous languages, and textbooks that are in line with current research findings.","PeriodicalId":54966,"journal":{"name":"International Journal of Cooperative Information Systems","volume":"10 1","pages":"1-16"},"PeriodicalIF":1.5,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70653598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}