A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis of Client-side Security for Long-term Time-stamping Services
2021
Zenodo
Besides, in existing papers, the security analyses of long-term time-stamping schemes only cover the server-side renewal, and the client-side renewal ismissing. ...
In this paper, we analyse the necessity of client-side renewal, and propose a comprehensive long-term time-stamping scheme that addresses both client-side renewal and server-side renewal mechanisms. ...
Security notions In this section, we formalize the syntax of a long-term time-stamping scheme, the security assumptions that are required for analysis, and the security properties that a long-term time-stamping ...
doi:10.5281/zenodo.5546768
fatcat:syluuxkbcfdvhp5d4cnxdcfg4u
A Blockchain-based Long-term Time-Stamping Scheme
[article]
2022
IACR Cryptology ePrint Archive
Traditional time-stamping services confirm the existence time of data items by using a time-stamping authority. ...
In this paper, we propose the first formal definition and security model of a Blockchainbased Long-Term Time-Stamping (BLTTS) scheme. ...
Thus, the long-term integrity of the scheme addresses the long-term security of server-side algorithms, and of the client-side hash functions. ...
dblp:journals/iacr/MengC22
fatcat:xe26ia6j6jfshn6mtdckgflvjm
A Portrait of Hunger, the Social Safety Net, and the Working Poor
2008
Policy Studies Journal
We gratefully acknowledge the financial support of the Center for Work, Poverty and Opportunity at the University of North Carolina at Chapel Hill. ...
Thanks also to Barbara Prather, Director of the CVFP, for her commitment to alleviating hunger. ...
twice the odds of needing long-term non-profit food assistance than clients who don't receive social security. ...
doi:10.1111/j.1541-0072.2008.00274.x
fatcat:4grt4jjnwvagbb423dzxjhwdby
A Novel Secure Remote User Authentication Protocol using Three Factors
2014
International Journal of Computer Applications
Moreover, impersonation, server spoofing, man-in-the-middle, denial-of-service etc attacks needs to handle properly to guarantee the security of the protocol. ...
Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed to do so. ...
Moreover, the interchanging messages between client and server are protected using secure hash function and not secured using any of long term keys, so compromised in any of these keys will not reveal ...
doi:10.5120/15297-3985
fatcat:tuxqkpttobgx5c2ct6eevhtjgm
Holistic Approach for Critical System Security: Flooding Prevention and Malicious Packet Stopping
[article]
2010
arXiv
pre-print
New concepts of packet stamp a dynamic-multi-communication-point mechanism has been identified for this proposed approach to make the prevention of flooding attacks easier and the performing of malicious ...
Denial of service attacks (DoS) can cause significant financial damages. Flooding and Malicious packets are two kinds of DoS attacks. ...
The HACSS makes the duration of time to stop the source changing dynamically to prevent a client from communicating with the system for long time, in case this client source is used in a flooding attack ...
arXiv:1002.3322v1
fatcat:feediap3ezfdzchaoxvamr2uha
Universally Composable Time-Stamping Schemes with Audit
[chapter]
2005
Lecture Notes in Computer Science
security. ...
We prove that our scheme is nearly optimal -in every UC time-stamping scheme, almost all time stamp requests must be communicated to the auditor. This paper is an extended abstract. ...
The authors are grateful to Estonian Science Foundation for supporting the study. ...
doi:10.1007/11556992_26
fatcat:kkaxi5xuwvgszdybwbx47uye4u
An Efficient Authentication Method for Secure Access to Wireless Mesh Networks
무선망 보안 접속을 위한 효율적인 인증 기법
2011
The Journal of the Korea Contents Association
무선망 보안 접속을 위한 효율적인 인증 기법
The results show that our method is superior to the conventional ones in terms of authentication response time and authentication service robustness. ■ keyword :|Wireless Mesh Network|Access Security|Authentication ...
In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained. ...
PERFORMANCE ANALYSIS AND COMPARISON In this section, we analytically evaluate the performance of our protocol in terms of robustness and computational cost and compare them with those of the traditional ...
doi:10.5392/jkca.2011.11.9.017
fatcat:inz34zae3bgu3ocsdqifl72fru
A Scalable and Intrusion-tolerant Digital Time-stamping System
2006
2006 IEEE International Conference on Communications
Secure digital time-stamps play a crucial role in many applications that rely on the correctness of time-sensitive information. ...
Our time-stamping system is intrusion-tolerant and it is based on a novel robust time service suitable for very large populations, on a robust threshold signature scheme, and on quorum system techniques ...
It usually consists of a time-stamping server that issues, for each client request, a timestamp and a non-malleable proof of its validity. ...
doi:10.1109/icc.2006.255122
dblp:conf/icc/Tulone06
fatcat:c63ap754vfhtlomsqdc3vpamca
mMamee: A mHealth Platform for Monitoring and Assessing Maternal Environmental Exposure
2015
2015 IEEE 28th International Symposium on Computer-Based Medical Systems
The conclusions derived highlight the feasibility of mMamee for the realization of long-term epidemiological studies. ...
This work presents mMamee, a mHealth platform for monitoring and assessing maternal environmental exposure. mMamee employs a client-server architecture and addresses the integration of sensing data and ...
ACKNOWLEDGMENT The authors would like to thank Nikolaos Rapousis and Michalis Katsarakis for their contributions in prototype development. ...
doi:10.1109/cbms.2015.56
dblp:conf/cbms/KaragiannakiCPP15
fatcat:q7tkoc3xhrbgrcnizx6lezctue
Experience Report: Trading Dependability, Performance, and Security through Temporal Decoupling
[chapter]
2011
Lecture Notes in Computer Science
Our results show that trading only a small amount of security does not pay off in terms of performance or dependability. ...
While it is widely recognized that security can be traded for performance and dependability, this trade-off lacks concrete and quantitative evidence. ...
This work has been partially funded by the Austrian Federal Ministry of Transport, Innovation and Technology under the FIT-IT project TRADE (Trustworthy Adaptive Quality Balancing through Temporal Decoupling ...
doi:10.1007/978-3-642-21387-8_18
fatcat:g5hw54m75jdwvi7bf6wlx7bl74
ESSTCP: Enhanced Spread-Spectrum TCP
2007
2007 IEEE International Parallel and Distributed Processing Symposium
Spread-Spectrum TCP (SSTCP) [1] is one of these methods by which the client sends an authentic sequence of SYN packets to the server for authentication. ...
We finally try to extend the functionality of this method for different applications and numbers of users by which ESSTCP can be performed as a secure Remote Procedure Call (RPC). ...
To avoid replay attacks, they propose to use time stamps for P1, P2, and P3, to enable the server to reject packets with same or older time stamps. ...
doi:10.1109/ipdps.2007.370617
dblp:conf/ipps/KhakpourC07
fatcat:mk33vusxuffqlahas53pa6qwj4
Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs
2020
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
So the challenge-response mechanism is not implemented correctly on the client-side. * Perfect forward secrecy: Perfect forward secrecy demands that even if an attacker knows the long term keys, he should ...
TABLE II NOTATIONS II AND ABBREVIATIONS
Notations
Description
C
Client
AP
Authenticator
AS
Authentication server
k
Long term key
p, pn
One-time key selected by server
L
One time key selected ...
doi:10.1109/mass50613.2020.00076
fatcat:lska3yeperbcpjwu3w3ynjdkee
Role of an auditing and reporting service in compliance management
2007
IBM Systems Journal
The files for the clients of the audit service are embedded in the product’s installation files, and the end-user installation package is shipped to the server side of the audit service. ...
Collect and store large volumes of data for long periods of time.
. Ensure that audit records are not lost or duplicated.
. ...
doi:10.1147/sj.462.0305
fatcat:jjttzicegfa4pcnz7nm2235usa
A secure cookie scheme
2012
Computer Networks
In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. ...
We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side. ...
Marco Gruteser and the anonymous reviewers for their constructive comments and useful suggestions on improving the presentation of this work. ...
doi:10.1016/j.comnet.2012.01.013
fatcat:7bv5hnjbpzcm3jxgazsq5kndqm
Using Software Puzzle for Reducing DDos/Dos Cost on SSL/TLS
2016
International Journal of Computer Applications
In cyber-security Denial-of-service and distributed Dos are the major threats, DOS and DDOS works by denying service users approved as genuine, traffic is jammed by the overwhelming illegal traffic frequencies ...
In this paper the puzzle is generated randomly by selecting CPU only code, with time stamps .the generated puzzle cannot be easily solved through GPU with in real time Keywords ...
It has different security requirement from the conventional cipher which demands long-term confidentiality only, long-term robustness against reverse-engineering only. ...
doi:10.5120/ijca2016911734
fatcat:km4p3d5xvnddzc5ike3bzwglxi
« Previous
Showing results 1 — 15 out of 15,508 results