Filters








66,000 Hits in 7.5 sec

An information-flow type-system for mixed protocol secure computation

Florian Kerschbaum
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
There are a number of domain-specific programming languages for secure computation.  ...  Consequently, a compiled protocol must be secure. We show an extension of the L1 language with our security type system and evaluate the implementation of two protocols from the literature.  ...  flow type system there is always an admissible information flow in secure computation.  ... 
doi:10.1145/2484313.2484364 dblp:conf/ccs/Kerschbaum13 fatcat:jwdgyakjybarfj76e544j65rb4

Advanced Secure Intrusion Detection System for MANET

Sayyed Musaddique, Hippargi S.S., Attar Shuaib
2015 IJIREEICE  
Then we propose an secure routing scheme to offer complete unlink ability and content un-observability for all types of packets.  ...  Then we propose an secure routing scheme to offer complete unlinkability and content unobservability for all types of packets.  ...  Pros and cons: SDAR is an novel secure distributed anonymous routing protocol for MANET.  ... 
doi:10.17148/ijireeice.2015.31220 fatcat:5vzcjllzp5cedgzqpoa4nkksau

Toward secure network coding in wireless networks: Threats and challenges

Jing Dong, Reza Curtmola, Ruben Sethi, Cristina Nita-Rotaru
2008 2008 4th Workshop on Secure Network Protocols  
In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding  ...  Adequate understanding of these threats is essential to effectively design secure practical network coding systems.  ...  However, these benefits are realized differently: Intra-flow network coding systems mix packets within individual flows, while inter-flow network coding systems mix packets across multiple flows.  ... 
doi:10.1109/npsec.2008.4664878 fatcat:3vfshp23vnglnja3hc523co5ci

Computational Decoys for Cloud Security [chapter]

Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis
2013 Secure Cloud Computing  
In this paper we present DIGIT, a system that employs decoy computation to impede the ability of adversaries to take advantage of unauthorized access to sensitive information.  ...  DIGIT introduces uncertainly as to which data and computation is legitimate by generating a mix of real and decoy activity within a cloud application.  ...  Similarity Grouping <R, CFG> <R', CFG'> <R'', CFG''> <R, R'''> R' R Computational Decoys for Cloud Security Computational Decoys for Cloud Security 5 Computational Decoys  ... 
doi:10.1007/978-1-4614-9278-8_12 fatcat:tgygysxnarchnd777bqq3mer2u

Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations

Aseem Rastogi, Matthew A. Hammer, Michael Hicks
2014 2014 IEEE Symposium on Security and Privacy  
We also prove type soundness, a property we show has security ramifications, namely that information about one party's data can only be revealed to another via (agreed upon) secure computations.  ...  Unlike past work, WYSTERIA provides support for mixed-mode programs, which combine local, private computations with synchronous SMCs.  ...  Acknowledgments: We would like to thank Nikhil Swamy and anonymous reviewers for their helpful comments and suggestions, and Jon Katz for helping us with the GMW library.  ... 
doi:10.1109/sp.2014.48 dblp:conf/sp/RastogiHH14 fatcat:iv4mmvm5vvedlcvz5vcezbdgiu

Secure network coding for wireless mesh networks: Threats, challenges, and directions

Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
2009 Computer Communications  
Then, we identify security goals and design challenges in achieving security for network coding systems.  ...  In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding  ...  However, these benefits are realized differently: Intra-flow network coding systems mix packets within individual flows, while inter-flow network coding systems mix packets across multiple flows.  ... 
doi:10.1016/j.comcom.2009.07.010 fatcat:64ty5nhk5zbmpguarkve3kvoiy

An Agent-Based Intelligent HCI Information System in Mixed Reality [article]

Hamed Alqahtani, Charles Z. Liu, Manolya Kavakli-Thorne, Yuzhi Kang
2019 arXiv   pre-print
This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative information for MR to improve user experience and information security based on context-aware computing.  ...  It also enables several types of awareness related to the interactive target, user-experience, system performance, confidentiality, and agent identification by applying several strategies, such as context  ...  Applying agent-aware computingbased scheme into an implementation of the collaborative information system for mixed reality, we improve user experience and immersion.  ... 
arXiv:1911.02726v1 fatcat:al7kbqooinhr3pshes7tytlgse

A Hybrid Scheme for Secure Wireless Communications in IoT

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Raheel Ahmed Memon
2021 Intelligent Automation and Soft Computing  
The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem  ...  Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/iasc.2021.017771 fatcat:gnbp7grx55futf6w2lyhmbggia

Real-time Intrusion Prevention System to Increase Computer Security in Wireless LAN

S V Athawale
2017 International Journal for Research in Applied Science and Engineering Technology  
Thus, iptables additionally referred to as Netfilter can even be implement as AN intrusion hindrance system. Iptables works by filtering the traffic flow between your pc and therefore the web.  ...  Network intrusion hindrance systems offer a crucial proactive defence capability against security threats by detective work and block network attacks.  ...  Figure eight shows the variation in turnout with modification in information Flows, for protocol and UDP protocols.  ... 
doi:10.22214/ijraset.2017.9206 fatcat:4hwnmmonjze4jaan6vla4h5xzq

Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip

Jason Oberg, Timothy Sherwood, Ryan Kastner
2013 IEEE design & test  
This article presents an approach to ensure information flow isolation between trusted and untrusted IP cores. VSwarup Bhunia, Case Western Reserve University  ...  Editor's notes: Integration of untrusted third-party IPs into an SoC design is a major challenge in establishing trustworthiness of the entire SoC.  ...  By designing a secure computing foundation, information flow can be tightly bounded in the system.  ... 
doi:10.1109/mdt.2013.2247457 fatcat:qbug4w4yi5euxk5qurjaxtt3cy

On Modeling of Ubiquitous Computing Environments Featuring Privacy [chapter]

Vivian C., Rodrigo Campiolo, Lucas Guardalben, Urian K., Joo Bosco M. Sobral
2011 Ubiquitous Computing  
The physical mean is specified through a CommunicationChannel class, the protocol by the PROTOCOL basic type and the connection by a pointer to an entity.  ...  If the user walks near an mixing zone, they receive, by flow 4, a request about your mixing rate for the mixing zone sensor determine if the user wants or not join the mixing.  ... 
doi:10.5772/14314 fatcat:xxipskfdwfcsfgi4ww26hi4wny

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016

Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de Fuentes
2017 Journal of Sensors  
The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.  ...  It aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goal of promoting discussions and collaborations  ...  We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for  ... 
doi:10.1155/2017/3057534 fatcat:y2x5fqe7lbhyfh5fo3lha63w2e

A Space Information Service Forwarding Mechanism Based on Software Defined Network

Wei Zhou, Baokang Zhao
2019 Journal of Internet Services and Information Security  
Space information network is an important strategic direction of China's 13th Five-Year Plan for the innovation of science and technology, which is also considered to be the current focus area of national  ...  Space information network includes multi-system integration that involves real-time acquisition, transmission, and processing over the information systems.  ...  Introduction Space information network supports various types of space platforms as a carrier through an efficient integration of multi-systems [5] .Space information network includes Geosynchronous Equatorial  ... 
doi:10.22667/jisis.2017.08.31.048 doaj:0333be2922ef418f9ace8597754e7aaa fatcat:5rqfpnnzizhmfojjhudcfjc4zi

A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack

Minmin Xie, Yong Wang, Chunming Zou, Yingjie Tian, Naiwang Guo
2020 Journal of Computer and Communications  
Substation automation system uses IEC 61850 protocol for the data transmission between different equipment manufacturers.  ...  In order to enhance security agreement, an improved algorithm was proposed based on identity authentication (W-EAP, Whitelist Based ECC & AES Protocol).  ...  Introduction IEC 61850 is an international standard for power systems. It is a communication standard for substations based on Ethernet.  ... 
doi:10.4236/jcc.2020.811007 fatcat:oh3b7eliivhfrgiidqgkj4mr6i

Cryptographic hashing using chaotic hydrodynamics

William Gilpin
2018 Proceedings of the National Academy of Sciences of the United States of America  
of L vectors of parameter values σ, which we refer to as a "stirring protocol" for the flow.  ...  Here, we show that this process bears strong similarity to the chaotic behavior of certain types of flows observed when ordinary fluids mix, such as the stirring of dye into water.  ...  I thank the US Department of Defense for supporting independent research through the National Defense Science & Engineering Fellowship program.  ... 
doi:10.1073/pnas.1721852115 pmid:29686070 fatcat:lhyzknub6vgyvlccq45vymtwdu
« Previous Showing results 1 — 15 out of 66,000 results