Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Bellare, A. Boldyreva, Jessica Staddon (2003)
Randomness Re-use in Multi-recipient Encryption Schemeas
G. Beldman (1997)
Lan medium access control (mac) and physical layer (phy) specifications
I. Jung, H. Yeom (2009)
Enhanced Security for Online Exams Using Group CryptographyIEEE Transactions on Education, 52
Henrik Martikainen, Alexander Sayenko, O. Alanen, V. Tykhomyrov (2008)
Optimal MAC PDU Size in IEEE 802.162008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks
Tao Peng, C. Leckie, K. Ramamohanarao (2007)
Survey of network-based defense mechanisms countering the DoS and DDoS problemsACM Comput. Surv., 39
A. Shamir (1984)
Identity-Based Cryptosystems and Signature Schemes
N. Garcia, M. Freire, P. Monteiro (2008)
The Ethernet Frame Payload Size and Its Effect on IPv4 and IPv6 Traffic2008 International Conference on Information Networking
A. Arabo, B. Pranggono (2013)
Mobile Malware and Smart Device Security: Trends, Challenges and Solutions2013 19th International Conference on Control Systems and Computer Science
A. Deshmukh, S. Singh, P. Sahane (2016)
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud DataInternational Journal of Advance Research, Ideas and Innovations in Technology, 3
D. Boneh, M. Franklin (2001)
Identity-Based Encryption from the Weil PairingSIAM J. Comput., 32
K. Paterson, Elizabeth Quaglia (2010)
Time-Specific EncryptionIACR Cryptol. ePrint Arch., 2010
S. Shukla, K. Vatanparvar, M. Faruque, W. Pan, T. Xie, H. Omar, Q. Shi, M. Ahmad, H. Dogan, O. Khan, G. Wang, C. Zang (2018)
ACM Transactions on Embedded Computing Systems continued on back cover
S. Muneer, Assosiate (2017)
Enhanced Security for Online Exams Using Group Cryptography
N. Piscataway (1996)
Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
D. Boneh (1999)
TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEMNotices of the American Mathematical Society, 46
Jordi Castellà-Roca, J. Herrera-Joancomartí, Aleix Dorca-Josa (2006)
A secure e-exam management systemFirst International Conference on Availability, Reliability and Security (ARES'06)
P. Maes, Robert Guttman, Alexandros Moukas (1999)
Agents that buy and sellCommun. ACM, 42
G. Kambourakis (2013)
Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art
(2015)
Received December
Dimitrios Zissis, D. Lekkas (2012)
Addressing cloud computing security issuesFuture Gener. Comput. Syst., 28
Wei Wang, Peng Xu, Hui Li, L. Yang (2014)
A Secure Synchronized Reading system over time-critical online contests2014 IEEE International Conference on Communications (ICC)
M. Bellare, A. Boldyreva, Anand Desai, D. Pointcheval (2001)
Key-Privacy in Public-Key Encryption
S. Galbraith (2001)
Supersingular Curves in Cryptography
Wenbo Mao (2001)
Timed-release Cryptography
Securely Reinforcing Synchronization for Embedded Online Contests WEI WANG and PENG XU, Huazhong University of Science and Technology LAURENCE TIANRUO YANG, Huazhong University of Science and Technology and St. Francis Xavier University WILLY SUSILO, University of Wollongong JINJUN CHEN, University of Technology Sydney When competing in eBay bidding, online games, or e-exams in embedded computing environments, people naturally face asynchronous starts from different computing devices, which is treated as a security risk of online contests. The security risks of online contests also include eavesdropping during data transmission without intended rights, and false starts by malicious competitors, which also means asynchrony in contests. Accordingly, online contests need security guarantees, especially on synchronization. In this article, for synchronic and secure starts in a contest, we update security requirements of confidentiality, anonymity, and synchrony, comparing the current work to our previous work. Based on the updated requirements, we propose a general framework for the Advanced Secure Synchronized Reading (ASSR) system, which can hold multiple contests simultaneously in the cloud. It is important to note that the system can ignore the impacts of heterogeneity among competitors. Considering the heterogeneity both on transmission and computing, we construct a novel Randomness-reused Identity Based Key
ACM Transactions on Embedded Computing Systems (TECS) – Association for Computing Machinery
Published: Jan 16, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.