Articles

Sort by
Previous Page Page 2 of 6 Next Page
  1. Research

    ASIC implementation of random number generators using SR latches and its evaluation

    A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches ...

    Naoya Torii, Hirotaka Kokubo, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka and Tsutomu Matsumoto

    EURASIP Journal on Information Security 2016 2016:10

    Published on: 16 May 2016

  2. Research

    Software control and intellectual property protection in cyber-physical systems

    Software control is a critical issue in cyber-physical systems (CPS); if the expected behavior of the software embedded in a single device of a CPS cannot be enforced then the behavior of the whole CPS may be ...

    Raphael C. S. Machado, Davidson R. Boccardo, Vinícius G. Pereira de Sá and Jayme L. Szwarcfiter

    EURASIP Journal on Information Security 2016 2016:8

    Published on: 12 April 2016

  3. Research

    A new usage control protocol for data protection of cloud environment

    With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environme...

    Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang and Mingjie Chen

    EURASIP Journal on Information Security 2016 2016:7

    Published on: 24 March 2016

  4. Research

    A landmark calibration-based IP geolocation approach

    Aiming at the existing IP geolocation approaches does not consider the errors of landmarks and delay; a new geolocation approach-utilized landmark calibration is proposed in this paper. At first, we find out t...

    Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao and Guang Zhu

    EURASIP Journal on Information Security 2016 2016:4

    Published on: 5 January 2016

  5. Research

    Combating online fraud attacks in mobile-based advertising

    Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of mobile-based ...

    Geumhwan Cho, Junsung Cho, Youngbae Song, Donghyun Choi and Hyoungshick Kim

    EURASIP Journal on Information Security 2016 2016:2

    Published on: 4 January 2016

  6. Research

    Markov process-based retrieval for encrypted JPEG images

    This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) c...

    Hang Cheng, Xinpeng Zhang, Jiang Yu and Fengyong Li

    EURASIP Journal on Information Security 2016 2016:1

    Published on: 4 January 2016

  7. Research

    Private function evaluation by local two-party computation

    Information processing services are becoming increasingly pervasive, such as is demonstrated by the Internet of Things or smart grids. Given the importance that these services have reached in our daily life, t...

    Stefan Rass, Peter Schartner and Monika Brodbeck

    EURASIP Journal on Information Security 2015 2015:7

    Published on: 22 December 2015

  8. Research

    Fingerprint-based crypto-biometric system for network security

    To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of...

    Subhas Barman, Debasis Samanta and Samiran Chattopadhyay

    EURASIP Journal on Information Security 2015 2015:3

    Published on: 3 April 2015

  9. Research

    Steganalysis of JSteg algorithm using hypothesis testing theory

    This paper investigates the statistical detection of JSteg steganography. The approach is based on a statistical model of discrete cosine transformation (DCT) coefficients challenging the usual assumption that...

    Tong Qiao, Florent Retraint, Rémi Cogranne and Cathel Zitzmann

    EURASIP Journal on Information Security 2015 2015:2

    Published on: 13 March 2015

  10. Research

    MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation

    Cyber security attacks are becoming ever more frequent and sophisticated. Enterprises often deploy several security protection mechanisms, such as anti-virus software, intrusion detection/prevention systems, a...

    Xin Hu, Ting Wang, Marc Ph Stoecklin, Douglas L Schales, Jiyong Jang and Reiner Sailer

    EURASIP Journal on Information Security 2014 2014:17

    Published on: 18 November 2014

  11. Research

    DNSSEC for cyber forensics

    Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users’ activities for censorship, to distribute malware and spam and to...

    Haya Shulman and Michael Waidner

    EURASIP Journal on Information Security 2014 2014:16

    Published on: 22 October 2014

  12. Research

    Conflict detection in obligation with deadline policies

    Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to sp...

    Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia and Anas Abou El Kalam

    EURASIP Journal on Information Security 2014 2014:13

    Published on: 10 September 2014

  13. Research

    Taxonomy of social network data types

    Online social networks (OSNs) have become an integral part of social interaction and communication between people. Reasons include the ubiquity of OSNs that is offered through mobile devices and the possibilit...

    Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger and Günther Pernul

    EURASIP Journal on Information Security 2014 2014:11

    Published on: 6 August 2014

Previous Page Page 2 of 6 Next Page