期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications
1
作者 Shi-Cho Cha Chuang-Ming Shiung +3 位作者 Wen-Wei Li Chun-Neng Peng Yi-Hsuan Hung kuo-hui yeh 《Computers, Materials & Continua》 SCIE EI 2022年第11期2731-2755,共25页
As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations,related stakeholders need a means to assess the trustworthiness of the applications involved within.It... As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations,related stakeholders need a means to assess the trustworthiness of the applications involved within.It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy.Therefore,this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications.The framework divides itself into different implementation domains,i.e.,organization security,application security,consensus mechanism security,node management and network security,host security and perimeter security,and simultaneously provides guidelines to control the security risks of permissioned blockchain applications with respect to these security domains.In addition,a case study,including a security testing and risk evaluation on each stack of a specific organization,is demonstrated as an implementation instruction of our proposed risk management framework.According to the best of our knowledge,this study is one of the pioneer researches that provide a means to evaluate the security risks of permissioned blockchain applications from a holistic point of view.If users can trust the applications that adopted this framework,this study can contribute to the adoption of permissioned blockchain-enabled technologies.Furthermore,application providers can use the framework to perform gap analysis on their existing systems and controls and understand the risks of their applications. 展开更多
关键词 Permissioned blockchain blockchain security blockchain risk evaluation
下载PDF
A lightweight authentication scheme with user untraceability 被引量:2
2
作者 kuo-hui yeh 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第4期259-271,共13页
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.... With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses. 展开更多
关键词 AUTHENTICATION PRIVACY Security Smart card UNTRACEABILITY
原文传递
Efficient and secure three-party authenticated key exchange protocol for mobile environments 被引量:1
3
作者 Chih-ho CHOU Kuo-yu TSAI +1 位作者 Tzong-chen WU kuo-hui yeh 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第5期347-355,共9页
Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing ell... Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems. However, Tan (2010) pointed out that Yang and Chang (2009)'s protocol cannot withstand impersonation and parallel attacks, and further proposed an enhanced protocol to resist these attacks. This paper demonstrates that Tan (2010)'s approach still suffers from impersonation attacks, and presents an efficient and secure three-party authenticated key exchange protocol to overcome shown weaknesses. 展开更多
关键词 Three-party Key exchange AUTHENTICATION Mobile environments
原文传递
Analysis and design of a smart card based authentication protocol 被引量:1
4
作者 kuo-hui yeh Kuo-Yu TSAI Jia-Li HOU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第12期909-917,共9页
Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days. Nevertheless, most of them do not pro... Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days. Nevertheless, most of them do not provide formal analysis proof, and the security robustness is doubtful. Chang and Cheng(2011) proposed an efficient remote authentication protocol with smart cards and claimed that their proposed protocol could support secure communication in a multi-server environment. Unfortunately, there are opportunities for security enhancement in current schemes. In this paper, we identify the major weakness, i.e., session key disclosure, of a recently published protocol. We consequently propose a novel authentication scheme for a multi-server environment and give formal analysis proofs for security guarantees. 展开更多
关键词 AUTHENTICATION PRIVACY SECURITY Smart card
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部