Filters








11,218 Hits in 2.9 sec

An atomicity-generating protocol for anonymous currencies

L.J. Camp
2001 IEEE Transactions on Software Engineering  
1* Atomicity is a necessary element for reliable transactions (Financial Service Technology  ...  The selection of a log would again be subject to negotiation . Notice that this protocol is optimized for on-line delivery.  ...  In certified delivery the content of the goods can be proven to a third party. Note that goods atomicity and certified delivery are only applicable for information goods.  ... 
doi:10.1109/32.910862 fatcat:zsleysmf6zb3fcunri3pnuqnti

Fuzzy based Combined Trust Scheme for Secure Routing in MANET (FCTRS)

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In MANET Black hole is also an attack and it is difficult to detect and prevent.  ...  Hence, this research work propose an enhanced Fuzzy based combined trust scheme (FCTRS) based on public trust and Quality of Service (QoS) trust to detect black hole attack.  ...  Moreover, one of the most prominent attacks in MANETs is the Black hole attack, which can be easily instigated on reactive routing protocols like AODV or Dynamic Source Routing (DSR).  ... 
doi:10.35940/ijitee.d1527.029420 fatcat:ajznuu64evcedbpxihpi3243gi

Efficient Identity-Based Protocol for Fair Certified E-mail Delivery [chapter]

Zhenfeng Zhang, Jing Xu, Dengguo Feng
2005 Lecture Notes in Computer Science  
An efficient and secure protocol in certified e-mail delivery is proposed in this paper.  ...  In this paper, we present an efficient and secure protocol in fair certified e-mail delivery (CEMD). Our protocol efficiently provides non-repudiation of origin and receipt in the fair manner.  ...  Hence, it is more suitable for the practical e-mail delivery circumstance. Conclusions This paper proposes an efficient and secure protocol in certified e-mail delivery.  ... 
doi:10.1007/11599371_17 fatcat:xe3op5bcsbggldtxnjejaavsk4

Verifying Second-Level Security Protocols [chapter]

Giampaolo Bella, Cristiano Longo, Lawrence C Paulson
2003 Lecture Notes in Computer Science  
The outcomes are demonstrated on a recent protocol for certified e-mail delivery by Abadi et al. [2] .  ...  A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals.  ...  Acknowledgements Research was funded by the epsrc grant GR/R01156/01 Verifying Electronic Commerce Protocols. Discussions with Martin Abadi, Bruno Blanchet, and Salvatore Riccobene were useful.  ... 
doi:10.1007/10930755_23 fatcat:nmtjggyinndyzpsvhns45hbrh4

On the Security of a Certified E-Mail Scheme with Temporal Authentication [chapter]

Min-Hua Shao, Jianying Zhou, Guilin Wang
2005 Lecture Notes in Computer Science  
Recently, Galdi and Giordano (2004) presented an optimistic protocol for certified e-mail with temporal authentication.  ...  Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation evidence that  ...  We further proposed the improvements to avoid such an attack. For example, Abadi et al. proposed an efficient certified e-mail scheme with a light on-line TTP [1].  ... 
doi:10.1007/11424857_77 fatcat:foterglrzvgkzjfbpc6257hszi

Some common attacks against certified email protocols and the countermeasures

Min-Hua Shao, Guilin Wang, Jianying Zhou
2006 Computer Communications  
Certified email is a value -added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation  ...  We further give several informal but useful guidelines to counter those common attacks in the design of certified email protocols.  ...  It has two certified mail protocols using an on-line TTP: basic certified mail protocol and stat eless certified mail protocol. (1) Basic certified mail protocol (BCMP).  ... 
doi:10.1016/j.comcom.2005.10.027 fatcat:upoajqwd6jgxpf2itzx5heptqe

A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol [article]

Suvansh Lal
2011 arXiv   pre-print
The paper uses ALSP (Action Language for Security Protocols) as an efficient formal specification language and SMODELS a model generator to formally analyze and plan attacks on the protocol.  ...  This paper projects the application of logic programming techniques for formal verification of a well referred security and transactions protocol, the NetBill.  ...  Certified Delivery Certified delivery protocols enable all engaging parties, to prove exactly what goods have been delivered through the protocol run.  ... 
arXiv:1101.1814v1 fatcat:blmeukl5t5ajzibj4vsxv4wiii

Selective Receipt in Certified E-mail [chapter]

Steve Kremer, Olivier Markowitch
2001 Lecture Notes in Computer Science  
In this paper we present new optimistic protocols for certified e-mail.  ...  We present two certified e-mail protocols respecting this property. First solutions to these exchange problem were based on gradual exchange protocols [13] .  ...  In opposition to express mail and compensation for lost items, the electronic version of certified delivery is more complicated to provide than the traditional one.  ... 
doi:10.1007/3-540-45311-3_14 fatcat:ev3pe3nprnfkbkr65awv2uhq44

A solution for secure certified electronic mail using Blockchain as a secure message board

M. Francisca Hinarejos, Josep-Lluis Ferrer-Gomila, LlorenC Huguet-Rotger
2019 IEEE Access  
Here, we present a new protocol for certified e-mail based on a blockchain without a conventional TTP that is integrated with the conventional e-mail infrastructure.  ...  The protocol is secure, efficient, and viable from a practical perspective. INDEX TERMS Bitcoin, blockchain, certified delivery, certified email, email security, fair exchange, nonrepudiation.  ...  Herrera-Joancomartí, researcher at the Department of Information Engineering and Communications of the Universitat Autònoma de Barcelona (UAB), for his advice and suggestions about Bitcoin.  ... 
doi:10.1109/access.2019.2902174 fatcat:ul7fzhgqbbewpavaazbqdgv7v4

Reliable MIX Cascade Networks through Reputation [chapter]

Roger Dingledine, Paul Syverson
2003 Lecture Notes in Computer Science  
We describe a MIX cascade protocol and a reputation system that together increase the reliability of a network of MIX cascades.  ...  By allowing any node to declare the failure of its own cascade, we eliminate the need for global trusted witnesses.  ...  Goodell and Marc Waldman for edits; Paul van Oorschot for a helpful conversation about hash functions; and David Molnar for early discussions about the design and for help with Section 3.  ... 
doi:10.1007/3-540-36504-4_18 fatcat:d2x76nvtjbbgtpbofgrq2evs7m

Cluster based Certificate Blocking Scheme using Improved False Accusation Algorithm

Chetan S Arage, K. V. V. Satyanarayana
2021 International Journal of Advanced Computer Science and Applications  
An algorithm is proposed that remembers false accusations for a set period of time in order to increase the number of normal nodes in the network and hence improve the system's performance.  ...  Ratio and performance are improved for Sybil attackers over the internet.  ...  But they all rely on confidence in networked nodes [14] . The first stage for a successful attack is that the node is a network component.  ... 
doi:10.14569/ijacsa.2021.0120671 fatcat:oowyemb6ibgwtosihgxuwopuau

An ECC-Based Secure Routing Protocol for Wireless Sensor Network

Yingyou Wen, Zhi Li, Shuyi Chen, Hong Zhao
2014 Sensors & Transducers  
According to the special secure routing requirements of the WSN, an ECC based secure routing algorithm for WSN is presented and implemented.  ...  This algorithm has the advantages of low energy consumption, light delay and high delivery.  ...  When a node forwarding a packet detects a link break through Route Maintenance, it tries to salvage the packet by searching in its route cache for an alternative route for the packet.  ... 
doaj:b6b0c00ec8e2471e826a319c8ce4b624 fatcat:2u6qvhramva53ei4zml3l6rqgm

T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks

Shashika Lokuliyana, Lakmal Rupasinghe
2018 International Journal of Computer Applications  
In a situation of a suspected malicious node, the TRUST based security protocol detects and isolate the attacker as the communication channels proceed.  ...  Wireless Sensor Networks (WSNs) operates with an open network topology without well-established infrastructure.  ...  This research project was conducted as a compulsory component in completion for the degree of Master of Science in Information Technology at Sri Lanka Institute of Information Technology.  ... 
doi:10.5120/ijca2018916432 fatcat:fsa3lgittrcxhbjbs6c72nsqvm

A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach

Panagiotis Katsaros
2009 Information and Software Technology  
We focus on the most notable payment transaction guarantees: money conservation, no double spending, goods atomicity, distributed payment atomicity, certified delivery or validated receipt and the high-level  ...  Apart from a roadmap to the forenamed transaction guarantees, this work's contribution is basically a full-fledged methodology for building and validating high-level protocol models and for proving payment  ...  Also, we acknowledge the anonymous referees for their thorough contribution in improving the quality of the present article.  ... 
doi:10.1016/j.infsof.2008.01.005 fatcat:lqmt4dxbprbllj7ghrnujhx34a

Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

Ing-Ray Chen, Fenye Bao, MoonJeong Chang, Jin-Hee Cho
2014 IEEE Transactions on Parallel and Distributed Systems  
Furthermore, our trust-based routing protocol can effectively trade off message overhead and message delay for a significant gain in delivery ratio.  ...  We develop a novel model-based methodology for the analysis of our trust protocol and validate it via extensive simulation.  ...  "objective trust" based on ground truth for protocol validation.  ... 
doi:10.1109/tpds.2013.116 fatcat:47p4uiuxefhyfd3ikk44d4xuy4
« Previous Showing results 1 — 15 out of 11,218 results