Contract theory is effective in designing incentive compatible mechanisms in a monopoly market under incomplete information, where the employer needs to sign a contract with employees before fully knowing their private information. The key idea is to offer the right contract items so that all agents have the incentive to truthfully reveal their private information. […]
MCLPKE SCHEME WITHOUT USING PAIRING OPERATIONS FOR SECURE DATA SHARING IN PUBLIC CLOUDS
An advantage of using a public cloud for storage is that the provider is responsible for building and maintaining the storage infrastructure and its associated costs including power, cooling and server maintenance. We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption […]
ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL
The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. In order to enhance the […]
TRUSTEE-BASED SOCIAL AUTHENTICATIONS SYSTEMS FOR SECURITY
In this abstract, we aim to provide systematic study about the security of trustee-based social authentications. To this end, we first propose a novel framework of attacks that are based on the observation that users’ security are correlated in trustee-based social authentications. In these attacks, an attacker initially obtains a small number of compromised users […]