Authentication Data - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Authentication Data

The Experts below are selected from a list of 3192 Experts worldwide ranked by ideXlab platform

Shigang Chen – 1st expert on this subject based on the ideXlab platform

  • Privacy-preserving RFID Authentication based on cryptographical encoding
    2012 Proceedings IEEE INFOCOM, 2012
    Co-Authors: Tao Li, Zhen Mo, Shigang Chen

    Abstract:

    Radio Frequency IDentification (RFID) technology has been adopted in many applications, such as inventory control, object tracking, theft prevention, and supply chain management. Privacy-preserving Authentication in RFID systems is a very important problem. Existing protocols employ tree structures to achieve fast Authentication. We observe that these protocols require a tag to transmit a large amount of Data in each Authentication, which costs significant bandwidth and energy overhead. Current protocols also impose heavy computational demand on the RFID reader. To address these issues, we design two privacy-preserving protocols based on a new technique called cryptographical encoding, which significantly reduces both Authentication Data transmitted by each tag and computation overhead incurred at the reader. Our analysis shows that the new protocols are able to reduce Authentication Data by more than an order of magnitude and reduce computational demand by about an order of magnitude, when comparing with the best existing protocol.

Xiaoyong Du – 2nd expert on this subject based on the ideXlab platform

  • GCC – Skip List Based Authenticated Data Structure in DAS Paradigm
    2009 Eighth International Conference on Grid and Cooperative Computing, 2009
    Co-Authors: Jieping Wang, Xiaoyong Du

    Abstract:

    In Database-as-a-Service (DAS) computing paradigm, Data owners delegate Database management tasks to service provider. Since the service provider is untrusted, query Authentication becomes an essential issue before Database outsourcing. In previous research, various Authentication Data Structures (ADS) have been proposed. However, most of them are either disk-based or static. Considering service provider usually owns large memory and powerful processors, in this paper we propose a dynamic main memory ADS based on skip list, which could provide efficient Authentication for range query both in static and in dynamic scenarios. Experimental results confirm our claim through a systematic analysis of verification metrics.

  • Skip List Based Authenticated Data Structure in DAS Paradigm
    2009 Eighth International Conference on Grid and Cooperative Computing, 2009
    Co-Authors: Jieping Wang, Xiaoyong Du

    Abstract:

    In Database-as-a-service (DAS) computing paradigm, Data owners delegate Database management tasks to service provider. Since the service provider is untrusted, query Authentication becomes an essential issue before Database outsourcing. In previous research, various Authentication Data structures (ADS) have been proposed. However, most of them are either disk-based or static. Considering service provider usually owns large memory and powerful processors, in this paper we propose a dynamic main memory ADS based on skip list, which could provide efficient Authentication for range query both in static and in dynamic scenarios. Experimental results confirm our claim through a systematic analysis of verification metrics.

Chang N. Zhang – 3rd expert on this subject based on the ideXlab platform

  • RC4 state and its applications
    2011 Ninth Annual International Conference on Privacy Security and Trust, 2011
    Co-Authors: Qian Yu, Chang N. Zhang

    Abstract:

    In this paper, we define the RC4 state and introduce its forward and backward property. Based on the RC4 state and its forward and backward property, a simple, lightweight, but robust security protocol which achieves Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operations is presented. Furthermore, an RC4 state based hash function for the generation of message Authentication code (MAC) is presented. The proposed protocol and hash function are ideal solution for resource-constrained applications where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.

  • Secure Broadcast in Wireless Sensor Networks
    2009 Third International Conference on Sensor Technologies and Applications, 2009
    Co-Authors: Qian Yu, Chang N. Zhang

    Abstract:

    In this paper we present a secure broadcast scheme for wireless sensor networks. The proposed scheme provides Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operation. Since it allows delayed and lost packets, the secure broadcast is supported. Furthermore, it eliminates the requirement of frequent key renewal to overcome a special limitation of the stream ciphers. Due to the simplicity, efficiency, and security, the proposed scheme is a competitive solution to provide secure broadcast in wireless sensor networks.

  • An RC4-Based Lightweight Security Protocol for Resource-constrained Communications
    2008 11th IEEE International Conference on Computational Science and Engineering – Workshops, 2008
    Co-Authors: Chang N. Zhang, Qian Yu, Xun Huang, Cungang Yang

    Abstract:

    In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message Authentication code (MAC) is presented. The proposed protocol is an ideal solution for resource-constrained environments where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.