A Summary of the Special Issue "Cybersecurity and Cryptography"

نویسندگان

  • Qiong Huang
  • Guomin Yang
چکیده

Nowadays in the cyber world, massive amounts of data are being collected, transmitted, and stored by different organizations and individuals. As an important asset, data must be well protected in storage and during transmission. Data security is a crucial factor to the success of new information technologies and infrastructures, such as Cloud Computing and Big Data. This Special Issue includes seven research articles presenting new findings and technologies in the area of cybersecurity and cryptography. The recent emergence of the targeted use of malware in cyber espionage urges a systematic review for better understanding its impact and mechanism. In the paper " The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism " [1], Wangen proposed a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts and their mechanisms. The proposed taxonomy provides not only a solid foundation of knowledge about the topic, but also a systematic way to document known and future attacks to facilitate research activities. Radio Frequency Identification (RFID) technology is widely used in supply chain management. In the paper " Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains " [2], Chen et al. investigated the security and privacy issues in RFID-based track and trace systems. They first studied the relationship among three different security concepts proposed in the literature—namely privacy, path unlinkability, and tag unlinkability—and proved that privacy is equivalent to path unlinkability, and tag unlinkability implies privacy. Moreover, they proposed an efficient track and trace scheme named Tracker+, which incurs less computation and storage overhead, compared with other schemes of the same type proposed in the literature.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Special Section on Cryptography and Information Security

This Special Section will be included in the Journal issue of the IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences (IEICE Trans. Fundamentals, for short), which will be published in January, 2019. The objective of the Special Section is to stimulate research in the area of cryptography and information security. You are strongly encouraged to submit origina...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Investigating Methods of Kleptography

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2015