Password-based mechanism is the widely used method for user authentication. Many password-based authenticated key exchange protocols have been proposed to resist password guessing attacks. In this paper, we present a simple authenticated key agreement protocol called
SAKA
which is simple and cost-effective. To examine its security, we provide a formal proof of security to show its strength against both passive and active adversaries. Compared with the previously best protocols,
SAKA
has less number of steps and less computation cost.
To ensure integrity and originality of digital information, digital signatures were proposed to provide both authority and non-repudiation. However, without an authenticated time-stamp we can neither trust signed documents when the signer's signature key was lost, stolen, or accidentally compromised, nor solve the cases when the signer himself repudiates the signing, claiming that he has accidentally lost his signature key. Based on relative temporal authentication, several linking schemes for digital time-stamping have been proposed to solve this problem. However, these schemes suffer from the forward forgery which is an attempt to stamp a present time-stamp on a past document by an unauthorized one. In addition, the verification cost in these schemes is too high because it is dependent upon the number of the issued timestamps. In this paper, we propose four time-stamped signature schemes that are based on absolute temporal authentication. These proposed schemes are very efficient in verifying the validity of time-stamped signatures and are quite secure against the forward forgery. It is natural that the time-stamped signature schemes based on absolute temporal authentication suffer from the weakness when the signer colludes with the Time-Stamping Service. To combat the collusion problem, time-stamped signature schemes with hybrid temporal authentication are therefore proposed. r
The current study applied cloud computing technology and smart mobile devices combined with a streaming server for parking lots to plan a city parking integration system. It is also equipped with a parking search system, parking navigation system, parking reservation service, and car retrieval service. With this system, users can quickly find parking lots near their destination, using various parking servers and the system center to connect to and integrate the cloud server. The computing power of the cloud servers transmits five of the closest parking lots with available parking spaces to a user's smart mobile device so the user can choose the most suitable parking lot. After users arrive at the parking lot, they can scan the information in the parking lot using an RFID indoor positioning system and the users' current location, so that the location of vacant parking spaces in the parking lot and moving vehicles will be displayed on their smart mobile device. In addition, the stored traffic flow record can provide local governments with statistics for building parking lots in the city in the future.
Abstract:The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which include requirements such as integrity, security and privacy to ensure the legal user can login to a remote server to get the service and resources they need. The radio frequency identification (RFID) is a very convenient technology with the property of non-contact reading. It uses the tag embedded in the object to identify the information quickly. Now, more and more devices are equipped with the RFID reader. Hence, the user can use the RFID reader embedded in the mobile device through a wireless network to read the information on the tag and then use the service which is called Mobile RFID. Compared to traditional RFID, the characteristic of mobility makes the reading more flexible. It can deal with the events in real-time and undertake the process faster and more efficiently. The major security problem of Mobile RFID is privacy, which is also a consideration when constructing a Mobile RFID Mechanism. In this paper, we propose a secure authentication mechanism which uses the authenticated delegating mechanism in Mobile RFID to enable the reader to get the specific role authority through a back-end database server. The reader has to undertake mutual authentication with the back-end database server and the tag. Then, it can protect the information and limit the access times of the reader to achieve privacy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.