The Experts below are selected from a list of 7233 Experts worldwide ranked by ideXlab platform
Ren Ping - One of the best experts on this subject based on the ideXlab platform.
-
CGC - Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
-
Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
Nishat Koti - One of the best experts on this subject based on the ideXlab platform.
-
ICACCI - Security analysis of tree and non-tree based group key management schemes under strong active outsider Attack Model
2015 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2015Co-Authors: Purushothama B R, Nishat KotiAbstract:Key management schemes for secure group communications should satisfy two basic security requirements, backward secrecy and forward secrecy. Most of the prominent secure group key management schemes are shown to satisfy the basic security requirements considering passive Attack Model. In this paper, we analyze secure group key management schemes under active outsider Attack Model. In active outsider Attack Model, an adversary can compromise a legitimate user of the group. We show that some of the efficient tree based, non-tree based and proxy re-encryption based group key management schemes are not secure under active Attack Model. We evaluate the cost involved in making these schemes secure under active Attack Model. Also, we construct a secure version of these schemes and show that the schemes are secure under active outsider Attack Model.
-
Security analysis of tree and non-tree based group key management schemes under strong active outsider Attack Model
2015 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2015Co-Authors: Purushothama B R, Nishat KotiAbstract:Key management schemes for secure group communications should satisfy two basic security requirements, backward secrecy and forward secrecy. Most of the prominent secure group key management schemes are shown to satisfy the basic security requirements considering passive Attack Model. In this paper, we analyze secure group key management schemes under active outsider Attack Model. In active outsider Attack Model, an adversary can compromise a legitimate user of the group. We show that some of the efficient tree based, non-tree based and proxy re-encryption based group key management schemes are not secure under active Attack Model. We evaluate the cost involved in making these schemes secure under active Attack Model. Also, we construct a secure version of these schemes and show that the schemes are secure under active outsider Attack Model.
Sun Dongbin - One of the best experts on this subject based on the ideXlab platform.
-
CGC - Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
-
Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
Sun Donghong - One of the best experts on this subject based on the ideXlab platform.
-
CGC - Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
-
Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
Liu Wu - One of the best experts on this subject based on the ideXlab platform.
-
CGC - Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.
-
Study on Anti-Attack Model for Low-Latency Anonymous Communication System
2012 Second International Conference on Cloud and Green Computing, 2012Co-Authors: Sun Dongbin, Liu Wu, Sun Donghong, Ren PingAbstract:This paper proposes an Anti-Attack Model for Low-latency Anonymous Communication System (AMLACS), which uses Center-P2P architecture to provide high-performance. And AMLACS supports anonymous communication by using spoofed source IP addresses to construct an invisible loop.