15,508 Hits in 6.0 sec

Analysis of Client-side Security for Long-term Time-stamping Services

Long Meng, Liqun Chen
2021 Zenodo  
Besides, in existing papers, the security analyses of long-term time-stamping schemes only cover the server-side renewal, and the client-side renewal ismissing.  ...  In this paper, we analyse the necessity of client-side renewal, and propose a comprehensive long-term time-stamping scheme that addresses both client-side renewal and server-side renewal mechanisms.  ...  Security notions In this section, we formalize the syntax of a long-term time-stamping scheme, the security assumptions that are required for analysis, and the security properties that a long-term time-stamping  ... 
doi:10.5281/zenodo.5546768 fatcat:syluuxkbcfdvhp5d4cnxdcfg4u

A Blockchain-based Long-term Time-Stamping Scheme [article]

Long Meng, Liqun Chen
2022 IACR Cryptology ePrint Archive  
Traditional time-stamping services confirm the existence time of data items by using a time-stamping authority.  ...  In this paper, we propose the first formal definition and security model of a Blockchainbased Long-Term Time-Stamping (BLTTS) scheme.  ...  Thus, the long-term integrity of the scheme addresses the long-term security of server-side algorithms, and of the client-side hash functions.  ... 
dblp:journals/iacr/MengC22 fatcat:xe26ia6j6jfshn6mtdckgflvjm

A Portrait of Hunger, the Social Safety Net, and the Working Poor

Maureen Berner, Trina Ozer, Sharon Paynter
2008 Policy Studies Journal  
We gratefully acknowledge the financial support of the Center for Work, Poverty and Opportunity at the University of North Carolina at Chapel Hill.  ...  Thanks also to Barbara Prather, Director of the CVFP, for her commitment to alleviating hunger.  ...  twice the odds of needing long-term non-profit food assistance than clients who don't receive social security.  ... 
doi:10.1111/j.1541-0072.2008.00274.x fatcat:4grt4jjnwvagbb423dzxjhwdby

A Novel Secure Remote User Authentication Protocol using Three Factors

Yogita Borse, Irfan Siddavatam
2014 International Journal of Computer Applications  
Moreover, impersonation, server spoofing, man-in-the-middle, denial-of-service etc attacks needs to handle properly to guarantee the security of the protocol.  ...  Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed to do so.  ...  Moreover, the interchanging messages between client and server are protected using secure hash function and not secured using any of long term keys, so compromised in any of these keys will not reveal  ... 
doi:10.5120/15297-3985 fatcat:tuxqkpttobgx5c2ct6eevhtjgm

Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping [article]

M.A. Alhabeeb, A.M Almuhaideb, P.D Le
2010 arXiv   pre-print
New concepts of packet stamp a dynamic-multi-communication-point mechanism has been identified for this proposed approach to make the prevention of flooding attacks easier and the performing of malicious  ...  Denial of service attacks (DoS) can cause significant financial damages. Flooding and Malicious packets are two kinds of DoS attacks.  ...  The HACSS makes the duration of time to stop the source changing dynamically to prevent a client from communicating with the system for long time, in case this client source is used in a flooding attack  ... 
arXiv:1002.3322v1 fatcat:feediap3ezfdzchaoxvamr2uha

Universally Composable Time-Stamping Schemes with Audit [chapter]

Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
2005 Lecture Notes in Computer Science  
security.  ...  We prove that our scheme is nearly optimal -in every UC time-stamping scheme, almost all time stamp requests must be communicated to the auditor. This paper is an extended abstract.  ...  The authors are grateful to Estonian Science Foundation for supporting the study.  ... 
doi:10.1007/11556992_26 fatcat:kkaxi5xuwvgszdybwbx47uye4u

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks
무선망 보안 접속을 위한 효율적인 인증 기법

Ung Heo, Yu-Shan He, Kang-Soo You, Jae-Ho Choi
2011 The Journal of the Korea Contents Association  
The results show that our method is superior to the conventional ones in terms of authentication response time and authentication service robustness. ■ keyword :|Wireless Mesh Network|Access Security|Authentication  ...  In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained.  ...  PERFORMANCE ANALYSIS AND COMPARISON In this section, we analytically evaluate the performance of our protocol in terms of robustness and computational cost and compare them with those of the traditional  ... 
doi:10.5392/jkca.2011.11.9.017 fatcat:inz34zae3bgu3ocsdqifl72fru

A Scalable and Intrusion-tolerant Digital Time-stamping System

Daniela Tulone
2006 2006 IEEE International Conference on Communications  
Secure digital time-stamps play a crucial role in many applications that rely on the correctness of time-sensitive information.  ...  Our time-stamping system is intrusion-tolerant and it is based on a novel robust time service suitable for very large populations, on a robust threshold signature scheme, and on quorum system techniques  ...  It usually consists of a time-stamping server that issues, for each client request, a timestamp and a non-malleable proof of its validity.  ... 
doi:10.1109/icc.2006.255122 dblp:conf/icc/Tulone06 fatcat:c63ap754vfhtlomsqdc3vpamca

mMamee: A mHealth Platform for Monitoring and Assessing Maternal Environmental Exposure

Katerina Karagiannaki, Stavros Chonianakis, Evridiki Patelarou, Athanasia Panousopoulou, Maria Papadopouli
2015 2015 IEEE 28th International Symposium on Computer-Based Medical Systems  
The conclusions derived highlight the feasibility of mMamee for the realization of long-term epidemiological studies.  ...  This work presents mMamee, a mHealth platform for monitoring and assessing maternal environmental exposure. mMamee employs a client-server architecture and addresses the integration of sensing data and  ...  ACKNOWLEDGMENT The authors would like to thank Nikolaos Rapousis and Michalis Katsarakis for their contributions in prototype development.  ... 
doi:10.1109/cbms.2015.56 dblp:conf/cbms/KaragiannakiCPP15 fatcat:q7tkoc3xhrbgrcnizx6lezctue

Experience Report: Trading Dependability, Performance, and Security through Temporal Decoupling [chapter]

Lorenz Froihofer, Guenther Starnberger, Karl M. Goeschka
2011 Lecture Notes in Computer Science  
Our results show that trading only a small amount of security does not pay off in terms of performance or dependability.  ...  While it is widely recognized that security can be traded for performance and dependability, this trade-off lacks concrete and quantitative evidence.  ...  This work has been partially funded by the Austrian Federal Ministry of Transport, Innovation and Technology under the FIT-IT project TRADE (Trustworthy Adaptive Quality Balancing through Temporal Decoupling  ... 
doi:10.1007/978-3-642-21387-8_18 fatcat:g5hw54m75jdwvi7bf6wlx7bl74

ESSTCP: Enhanced Spread-Spectrum TCP

Amir R. Khakpour, Hakima Chaouchi
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
Spread-Spectrum TCP (SSTCP) [1] is one of these methods by which the client sends an authentic sequence of SYN packets to the server for authentication.  ...  We finally try to extend the functionality of this method for different applications and numbers of users by which ESSTCP can be performed as a secure Remote Procedure Call (RPC).  ...  To avoid replay attacks, they propose to use time stamps for P1, P2, and P3, to enable the server to reject packets with same or older time stamps.  ... 
doi:10.1109/ipdps.2007.370617 dblp:conf/ipps/KhakpourC07 fatcat:mk33vusxuffqlahas53pa6qwj4

Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs

Awaneesh Kumar Yadav, Manoj Misra, Madhusanka Liyanage, Gaurav Varshney
2020 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)  
So the challenge-response mechanism is not implemented correctly on the client-side. * Perfect forward secrecy: Perfect forward secrecy demands that even if an attacker knows the long term keys, he should  ...  TABLE II NOTATIONS II AND ABBREVIATIONS Notations Description C Client AP Authenticator AS Authentication server k Long term key p, pn One-time key selected by server L One time key selected  ... 
doi:10.1109/mass50613.2020.00076 fatcat:lska3yeperbcpjwu3w3ynjdkee

Role of an auditing and reporting service in compliance management

J. Ramanathan, R. J. Cohen, E. Plassmann, K. Ramamoorthy
2007 IBM Systems Journal  
The files for the clients of the audit service are embedded in the product’s installation files, and the end-user installation package is shipped to the server side of the audit service.  ...  Collect and store large volumes of data for long periods of time. . Ensure that audit records are not lost or duplicated. .  ... 
doi:10.1147/sj.462.0305 fatcat:jjttzicegfa4pcnz7nm2235usa

A secure cookie scheme

Alex X. Liu, Jason M. Kovacs, Mohamed G. Gouda
2012 Computer Networks  
In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services.  ...  We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.  ...  Marco Gruteser and the anonymous reviewers for their constructive comments and useful suggestions on improving the presentation of this work.  ... 
doi:10.1016/j.comnet.2012.01.013 fatcat:7bv5hnjbpzcm3jxgazsq5kndqm

Using Software Puzzle for Reducing DDos/Dos Cost on SSL/TLS

Pankaj Kumar, S. S., Tharun Kumar
2016 International Journal of Computer Applications  
In cyber-security Denial-of-service and distributed Dos are the major threats, DOS and DDOS works by denying service users approved as genuine, traffic is jammed by the overwhelming illegal traffic frequencies  ...  In this paper the puzzle is generated randomly by selecting CPU only code, with time stamps .the generated puzzle cannot be easily solved through GPU with in real time Keywords  ...  It has different security requirement from the conventional cipher which demands long-term confidentiality only, long-term robustness against reverse-engineering only.  ... 
doi:10.5120/ijca2016911734 fatcat:km4p3d5xvnddzc5ike3bzwglxi
« Previous Showing results 1 — 15 out of 15,508 results