[[abstract]]Online social networks (OSNs) such as Facebook and MySpace are flourishing because more and more people are using OSNs to share their interests with friends. Because security and privacy issues on OSNs are major concerns, we propose a security framework for simultaneously authenticating multiple users to improve the efficiency and security of peer-to-peer (P2P)-based OSNs. In the proposed framework, three batch authentication protocols are proposed, adopting the one-way hash function, ElGamal proxy encryption, and certificates as the underlying cryptosystems. The hash-based authentication protocol requires lower computational cost and is suitable for resource-limited devices. The proxy-based protocol is based on asymmetric encry...
© 2015 Elsevier B.V. All rights reserved. Online Social Networks (OSNs) constitute vital communicati...
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in m...
Traditional secure registration protocols rely on client-server authentication procedures. This conc...
Abstract—Online social networks (OSNs) such as Facebook and MySpace are flourishing because more and...
Abstract—Web services are increasingly adopting auxiliary authentication mechanisms to supplement th...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
Abstract—A multitude of privacy breaches, both accidental and malicious, have prompted users to dist...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
Users frequently reuse their passwords when authenticating to various online services. Combined with...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust cent...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Web-based single sign-on describes a class of protocols where a user signs into a web site with the ...
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that ...
© 2015 Elsevier B.V. All rights reserved. Online Social Networks (OSNs) constitute vital communicati...
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in m...
Traditional secure registration protocols rely on client-server authentication procedures. This conc...
Abstract—Online social networks (OSNs) such as Facebook and MySpace are flourishing because more and...
Abstract—Web services are increasingly adopting auxiliary authentication mechanisms to supplement th...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
Abstract—A multitude of privacy breaches, both accidental and malicious, have prompted users to dist...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
Users frequently reuse their passwords when authenticating to various online services. Combined with...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust cent...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Web-based single sign-on describes a class of protocols where a user signs into a web site with the ...
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that ...
© 2015 Elsevier B.V. All rights reserved. Online Social Networks (OSNs) constitute vital communicati...
To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in m...
Traditional secure registration protocols rely on client-server authentication procedures. This conc...