Sciweavers

39
Voted
IJNSEC
2016
35views more  IJNSEC 2016»
10 years 1 months ago
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in pr...
Martin Stanek
43
Voted
IJNSEC
2016
39views more  IJNSEC 2016»
10 years 1 months ago
Threshold Signature Scheme without Using Polynomial Interpolation
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer th...
Lein Harn, Feng Wang
45
Voted
IJNSEC
2016
39views more  IJNSEC 2016»
10 years 1 months ago
Penetration Testing and Mitigation of Vulnerabilities Windows Server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
43
Voted
IJNSEC
2016
50views more  IJNSEC 2016»
10 years 1 months ago
A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional wate...
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadi...
42
Voted
IJNSEC
2016
50views more  IJNSEC 2016»
10 years 1 months ago
A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang