649 Hits in 2.9 sec

Asynchronous Provably-Secure Hidden Services [chapter]

Philippe Camacho, Fernando Krell
2018 Lecture Notes in Computer Science  
To the best of our knowledge this is the first study of asynchronous protocols that provide strong security guarantees for the hidden server problem.  ...  Nonetheless our solution has two major advantages: it is asynchronous and it is secure against any number of corrupted nodes.  ...  Tor hidden services [8] is without a doubt the most popular alternative for this purpose.  ... 
doi:10.1007/978-3-319-76953-0_10 fatcat:4lm3dqjxpbg2nawevdgy2mznje

EL PASSO: Privacy-preserving, Asynchronous Single Sign-On [article]

Zhiyi Zhang, Michał Król, Alberto Sonnino, Lixia Zhang, Etienne Rivière
2020 arXiv   pre-print
EL PASSO does not require specific secure hardware or a third party (other than existing participants in SSO).  ...  We introduce EL PASSO, a privacy-preserving, asynchronous Single Sign-On (SSO) system.  ...  We leverage instead the password manager service provided by the browser to store secrets and credentials securely.  ... 
arXiv:2002.10289v2 fatcat:v3uissgf6nf6thicamrupcudwa

Virtual Hidden Network [chapter]

Natori Shin
2001 IFIP Advances in Information and Communication Technology  
In this paper, we first propose a new type of network model named Virtual Hidden Network (VHN), an invisible network layered over steganography channels.  ...  If a steganography system is secure enough, no eavesdropper can detect the existence of hidden message.  ...  The security of a steganography system is the difficulty for the eavesdroppers to detect the existence of hidden message.  ... 
doi:10.1007/978-0-387-35413-2_28 fatcat:7l7q5irk6zestje6sdnmcqksia

Advances in privacy-preserving computing

Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei
2021 Peer-to-Peer Networking and Applications  
The fifteenth article by Diksha Rangwani et al. on 'A Robust Provable-Secure Privacy-Preserving Authentication Protocol for Industrial Internet of Things' proposes a remote user authentication scheme for  ...  access services provided by the grid.  ... 
doi:10.1007/s12083-021-01110-9 fatcat:o5vvf6ezcna2pc32g6oapioalu

Performance Development for Securing the Data Sharing Services in Cloud Storage using Hybrid Encryption

Thirumalaikumari T, Dr. C. Shanthi
2022 International Journal on Recent and Innovation Trends in Computing and Communication  
Despite all the exploration that has been done around here, enormous information stockpiling security and security stays one of the main issues of associations that embrace computing and huge information  ...  Moreover, the expanding measure of huge information reevaluated in the cloud builds the possibility to penetrate the protection and security of these data.  ...  The personality of the underwriter on each square in shared information is kept hidden from the TPA [13] .In distributed computing, the Cloud Service Providers (CSPs) can convey different administrations  ... 
doi:10.17762/ijritcc.v10i7.5561 fatcat:2eeyxro3lfhvxo2u3owljij4di

A Study of Blockchain Oracles [article]

Abdeljalil Beniiche
2020 arXiv   pre-print
Provable or Oraclize provides a secure connection between smart contracts and the external world, enabling both data-fetching and delegation of code execution.  ...  While building the service, the Provable team has realized that the concept of authenticity proofs has much broader applicability than initially envisioned.  ... 
arXiv:2004.07140v2 fatcat:34ez7hbt7namvb4wfs5ch76cly

Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming

Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine
2007 IEEE/ACM Transactions on Networking  
We then develop an extended version of this protocol, called asynchronous synchronization, which avoids the penalty, is serverless, offers provable anti-cheating guarantees, is robust in the presence of  ...  We propose a protocol that has provable anti-cheating guarantees, is provably safe and live, but suffers a performance penalty.  ...  It is a stepping stone to our asynchronous synchronization protocol, which improves performance without sacrificing security. A.  ... 
doi:10.1109/tnet.2006.886289 fatcat:cxosipswgbaxhl4evrookxlcs4


2022 Zenodo  
Distributed Denial of services (DDOS) attacks are one of the most famous attacks that affect the availability of a service making it a serious problem especially when it comes to cloud computing as it  ...  The prevention of the DDOS attacks is the foremost important step in protecting the cloud from DDOS which is achieved through challengeresponse, hidden servers, and restrictive access approaches.  ...  While the Hidden server helps legit clients to access the services provided without any direct connection with the server at the beginning but it requires an extra layer of security for redirection and  ... 
doi:10.5281/zenodo.6856824 fatcat:ejys7q62zzernd52uo5fpwnhfq

Game of Threads

Jose Rodrigo Sanchez Vicarte, Benjamin Schreiber, Riccardo Paccagnella, Christopher W. Fletcher
2020 Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems  
This paper studies the security implications of these codes by introducing asynchronous poisoning attacks.  ...  In asynchronous training, many threads share and update model parameters in a racy fashion to avoid costly interthread synchronization.  ...  We explore the implications of asynchronous training on machine learning model integrity, in adversarial settings. Consider a setting such as Machine Learning as a Service (MLaaS) [1, 2] .  ... 
doi:10.1145/3373376.3378462 dblp:conf/asplos/VicarteSPF20 fatcat:v7nveklj2bh5le7pie7yvs3zuq

Secure and Efficient Asynchronous Broadcast Protocols [chapter]

Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
2001 Lecture Notes in Computer Science  
This paper addresses secure service replication in an asynchronous environment with a static set of servers, where a malicious adversary may corrupt up to a threshold of servers and controls the network  ...  Secure causal broadcast extends atomic broadcast by encryption to guarantee a causal order among the delivered messages.  ...  Our focus is on methods for distributing secure, trusted services on the Internet with the goal of increasing their availability and security.  ... 
doi:10.1007/3-540-44647-8_31 fatcat:6tcue5nvt5er5pxwjdefgjjxai

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting [article]

Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh
2019 arXiv   pre-print
We realize this abstraction by building on federated learning, the state of the art in multi-party ML, to construct TorMentor: an anonymous hidden service that supports private multi-party ML.  ...  We propose a brokered learning abstraction that allows data sources to contribute towards a globally-shared model with provable privacy guarantees in an untrusted setting.  ...  We deployed the broker at our home institution as a hidden service on Tor.  ... 
arXiv:1811.09712v2 fatcat:ay7eeljx2rc2tbzpnjgta2c6be

Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic

Washington Cilio, Michael Linder, Chris Porter, Jia Di, Dale R. Thompson, Scott C. Smith
2013 Microelectronics Journal  
Developed sample-sort simulated annealing, a parallel simulated annealing algorithm that has provable convergence.  ...  Thompson, and Jia Di, "Exploiting hidden Markov Models in identifying passive UHF RFID tags," in Proc.  ...  Security and Privacy Threat Modeling research to the UA ITRI PROJECTS • Aug. 2012 -present: Mobile Anonymous Communications: A smartphone-based anonymous network that uses the Short Message Service (SMS  ... 
doi:10.1016/j.mejo.2012.12.001 fatcat:3udmp6nc5bgtnkb37b6ett64my

Security and Privacy Functionalities in IoT

Elahe Fazeldehkordi, Olaf Owe, Josef Noll
2019 2019 17th International Conference on Privacy, Security and Trust (PST)  
that can cause distributed denial of service (DDoS) attacks using static analysis technique.  ...  Provability of IoT and distributed systems depends on the language used to model the system, its semantics, and the kind of system properties to prove and the techniques used to verify them.  ...  Acknowledgements Acknowledgment This work has been supported by the research project IoTSec, Security in IoT for Smart Grids, with number 248113/O70 part of the IKTPLUSS program funded by the Research  ... 
doi:10.1109/pst47121.2019.8949054 dblp:conf/pst/FazeldehkordiON19 fatcat:x37vqxe35vdtdlo2xebg7beaoa

Machine Learning Systems for Intelligent Services in the IoT: A Survey [article]

Wiebke Toussaint, Aaron Yi Ding
2020 arXiv   pre-print
Machine learning (ML) technologies are emerging in the Internet of Things (IoT) to provision intelligent services.  ...  These data dependencies are often hidden and can have unexpected effects that make machine learning systems brittle and error diagnosis expensive. Security attacks on data.  ...  This approach has provable privacy guarantees and has become the standard for protecting sensitive data in machine learning. v.d.  ... 
arXiv:2006.04950v3 fatcat:xrjcioqkrrhpvgmwmutiajgfbe

Cryptanalysis of GlobalPlatform Secure Channel Protocols [chapter]

Mohamed Sabt, Jacques Traoré
2016 Lecture Notes in Computer Science  
Second, we investigate the security of SCP03 that was introduced as an amendment in 2009. We find that it provably satisfies strong notions of security.  ...  Our findings highlight the great value of the paradigm of provable security for standards and certification, since unlike extensive evaluation, it formally guarantees the absence of security flaws.  ...  Our goal is thus to study them through provable security, and hence to validate (or invalidate) the security guaranteed by GP.  ... 
doi:10.1007/978-3-319-49100-4_3 fatcat:u4vfrzmgefevfd56xl3n2juugm
« Previous Showing results 1 — 15 out of 649 results