http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
Jayaprakash Kar,Banshidhar Majhi 보안공학연구지원센터 2009 International Journal of Security and Its Applicat Vol.3 No.4
In this paper we have proposed an efficient password security of Three- Party Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow two parties communicating over a public network to establish a common secret key called session key. Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings. Here we have taken two one-way hash functions to build the level of security high.
Mitigating Threats and Security Metrics in Cloud Computing
( Jayaprakash Kar ),( Manoj Ranjan Mishra ) 한국정보처리학회 2016 Journal of information processing systems Vol.12 No.2
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.
Mitigating Threats and Security Metrics in Cloud Computing
Kar, Jayaprakash,Mishra, Manoj Ranjan Korea Information Processing Society 2016 Journal of information processing systems Vol.12 No.2
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.
Certificateless Public Key Cryptography : A Research Survey
Jacob Sayid,Isaac Sayid,Jayaprakash Kar 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.7
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless setting with the security model and discuss the performance. Also, we present the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors.
Cryptographic Protocols for Secure Cloud Computing
S. A. Alhumrani,Jayaprakash Kar 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.2
In this paper, we review and analyze some well-known cryptographic protocols for encryption of data that establish a secure communication for clouds. Many protocols are there, which provides various security goals for cloud computing. We have briefed on Secure Shell Protocol, Internet Protocol Security (IPSec), Kerberos, Wired Equivalent Privacy (WEP) and WiFi Protected Access(WPA) and discuss how these have been applied in cloud for secure communication. Further, we present the commands used by these protocols, the various methods used to encrypt data (tunnels and channels for instance) and their advantages for clouds.
A Research Survey of Ring Signature Scheme and Implementation Issues
F. A. Alahmari,Turki. A. Alqarni,Jayaprakash Kar 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.6
In this paper, we have presented a study on traditional group signatures, which is the Ring Signature T out of n threshold and discuss its implementation issues. Also, we outline the security issues. In threshold Signature Scheme the information can be encrypted and decrypted, only if T numbers out of n numbers (t<n) in the group use their secret keys. As compare to the traditional ring signature scheme, it is more efficient that can prevent spurious or fake messages issued in the name of a reputed group by a compromised personnel in the group.