Search For:

Displaying 1-14 out of 14 total
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols
Found in: Network and System Security, International Conference on
By Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi
Issue Date:October 2009
pp. 102-106
Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange ...
 
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing
Found in: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE)
By Fei Li,Yogachandran Rahulamathavan,Muttukrishnan Rajarajan,Raphael C.-W Phan
Issue Date:March 2013
pp. 573-577
In multi-authority attribute based encryption (MA-ABE) schemes, multiple authorities monitor different set of attributes and the corresponding shared-decryption-keys. In such schemes the encrypt or can encrypt a message and upload to the cloud, whereas onl...
 
A Formally Verified Device Authentication Protocol Using Casper/FDR
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Mahdi Aiash,Glenford Mapp,Raphael C.-W. Phan,Aboubaker Lasebae,Jonathan Loo
Issue Date:June 2012
pp. 1293-1298
For communication in Next Generation Networks, highly-developed mobile devices will enable users to store and manage a lot of credentials on their terminals. Furthermore, these terminals will represent and act on behalf of users when accessing different ne...
 
Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis
Found in: IEEE Transactions on Affective Computing
By Yogachandran Rahulamathavan,Raphael C.-W. Phan,Jonathon A. Chambers,David J. Parish
Issue Date:January 2013
pp. 83-92
Facial expression recognition forms a critical capability desired by human-interacting systems that aim to be responsive to variations in the human's emotional state. Recent trends toward cloud computing and outsourcing has led to the requirement for facia...
 
A Framework for Describing Block Cipher Cryptanalysis
Found in: IEEE Transactions on Computers
By Raphael C.-W. Phan, Mohammad Umar Siddiqi
Issue Date:November 2006
pp. 1402-1409
Block ciphers provide confidentiality by encrypting confidential messages into unintelligible form, which are irreversible without knowledge of the secret key used. During the design of a block cipher, its security against cryptanalysis must be considered....
 
Attacks on Improved Key Distribution Protocols with Perfect Reparability
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Raphael C.-W. Phan, Bok-Min Goi
Issue Date:December 2008
pp. 595-599
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000.
 
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI
Found in: IEEE Transactions on Dependable and Secure Computing
By Raphael C.-W. Phan
Issue Date:October 2009
pp. 316-320
Since RFID tags are ubiquitous and at times even oblivious to the human user, all modern RFID protocols are designed to resist tracking so that the location privacy of the human RFID user is not violated. Another design criterion for RFIDs is the low compu...
 
Security of Group Key Exchange Protocols with Different Passwords
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Raphael C.-W. Phan
Issue Date:May 2009
pp. 147-152
Password-based authenticated group key exchange protocols allow group users to jointly share a session key based on a human-memorizable password. In this paper, we present an undetectable online dictionary attack on N-EKE-D, a recent provably secure protoc...
 
Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks
Found in: 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA)
By Ansar Jamil,David J. Parish,Raphael C.-W. Phan,Iain Phillips,John Whitley,George Oikonomou
Issue Date:December 2012
pp. 1-8
Wireless Sensor Networks are an emerging technology with wide potential to be used in many applications. One such application is the detection and prevention of disasters in scenarios such as forest fires, floods and earthquakes. In these disaster situatio...
 
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method
Found in: Computer and Information Technology, International Conference on
By Jie Wang, Raphael C.-W. Phan, John N. Whitley, David J. Parish
Issue Date:July 2010
pp. 1009-1014
Distributed Denial of Service (DDoS) is a serious computer network attack which can cause extreme performance degradation on the victim server. This paper presents a formal and methodical way of modeling DDoS attack by the method of Augmented Attack Tree (...
 
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Raphael C.-W. Phan
Issue Date:May 2009
pp. 134-139
When humans interact with machines in their daily networks, it is important that security of the communications is offered, and where the involved shared secrets used to achieve this are easily remembered by humans. Password-based authenticated group key e...
 
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Raphael C.-W. Phan, Bok-Min Goi
Issue Date:December 2008
pp. 443-446
A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key ag...
 
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Found in: Young Computer Scientists, International Conference for
By Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael C-W. Phan, Roderick Bloem
Issue Date:November 2008
pp. 2289-2294
Trusted Computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted so...
 
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Found in: IEEE Transactions on Dependable and Secure Computing
By Yogachandran Rahulamathavan,Raphael C.-W. Phan,Suresh Veluru,Kanapathippillai Cumanan,Muttukrishnan Rajarajan
Issue Date:December 2013
pp. 1
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untruste...
 
 1