Filters








58 Hits in 3.7 sec

Embedded Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication With Recovery

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e.  ...  Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one  ...  by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. ( ) ( ) H m H m′ = .  ... 
doi:10.5281/zenodo.1073063 fatcat:wvddktt2izd3bklyxzb57llali

A Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of  ...  The former is used to compute the contents based hash and the latter to embed the watermark.  ...  Each block along with ownership information is then deployed by SHA160, one way hash function that generates the content based hash, which is unique and resistant to hash collision or birthday attack,  ... 
doi:10.5281/zenodo.1071412 fatcat:xhkau4iafzafra2rikkqgspywi

BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning [article]

Charles Noyes
2016 arXiv   pre-print
The peer-to-peer network maintenance mechanism lowered the average update propagation speed by 500% and is far less susceptible to targeted denial-of-service attacks.  ...  BitAV allows for the decentralization of the update and maintenance mechanisms of the software, traditionally performed by a central host, and uses a staggered scanning mechanism in order to improve performance  ...  Additionally, this is assuming SHA-256 is used as a hash function; should another hash function of digest length d be used, the approximate odds of finding a collision are 1 2 d .  ... 
arXiv:1601.01405v1 fatcat:dxepqzs4jjfexjkxy7mubfu2tm

Finding Bugs in Cryptographic Hash Function Implementations

Nicky Mouha, Mohammad S. Raunak, D. Richard Kuhn, Raghu Kacker
2018 IEEE Transactions on Reliability  
Motivated by the cryptographic properties that a hash function should satisfy, we develop four tests.  ...  We revisit the NIST hash function competition, which was used to develop the SHA-3 standard, and apply a new testing strategy to all available reference implementations.  ...  Responsible disclosure: to the best of our knowledge, none of the SHA-3 candidate algorithms are used in commercial products, except for Keccak, which became the SHA-3 standard.  ... 
doi:10.1109/tr.2018.2847247 pmid:31092953 pmcid:PMC6512998 fatcat:nn3vxn5eqjg3dfu57wunfgo7fq

A Network Clustering Algorithm for Sybil-Attack Resisting

Ling XU, Ryusuke EGAWA, Hiroyuki TAKIZAWA, Hiroaki KOBAYASHI
2011 IEICE transactions on information and systems  
RSC observes that the betweennesses of attack edges are higher than those of the non-attack edges. In this way, the attack edges can be identified.  ...  This model assumes that honest peers and Sybil peers are connected by only a small number of attack edges. Detection of the attack edges plays a key role in restraining the power of Sybil peers.  ...  Here, IP(s ) denotes the IP address of s , and hash() can be any collision-free hash function. Algorithm 2 describes the behaviors of each peer v in the relay of steered random walks.  ... 
doi:10.1587/transinf.e94.d.2345 fatcat:vtfkqf4aevclzcldvrxxgfse6y

Private Blocklist Lookups with Checklist [article]

Dmitry Kogan, Henry Corrigan-Gibbs
2021 IACR Cryptology ePrint Archive  
We have modified Firefox to perform Safe-Browsing blocklist lookups via Checklist servers, which eliminates the leakage of partial URL hashes from the Firefox client to the blocklist servers.  ...  Today, lookups to this blocklist leak partial hashes of a subset of clients' visited URLs to Google's servers.  ...  Elaine Shi kindly pointed us to related work on dynamic data structures.  ... 
dblp:journals/iacr/KoganC21 fatcat:ihjmubmvtzckhopqhcbgxipkuy

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols

Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard J. Thomas
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Acknowledgements Funding for this paper was provided by the UKs Centre for the Protection of National Infrastructure (CPNI) and Engineering and Physical Sciences Research Council (EPSRC) via the SCEPTICS  ...  Details on the probabilities of a collision and the time needed for an attacker to find a collision are discussed in the next section.  ...  Figure 6 : 6 Attack probabilities for the number of messages and sessions observed Figure 7 : 7 RF waterfall graph output from gnuradio.  ... 
doi:10.1145/3052973.3053027 dblp:conf/ccs/ChothiaORT17 fatcat:4sx7ichg2rd2fgodoj5hilaxqm

P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements

Antonio Muñoz, Aristeidis Farao, Jordy Ryan Casas Correia, Christos Xenakis
2021 Information  
On the security side, however, most environments seem to focus on authentication, neglecting other critical aspects, such as the integrity of the source code and the compiled binaries.  ...  This paper presents P2ISE, a novel integrity-preserving tool that provides strong security assertions for developers against attackers.  ...  This will help us identify additional use cases for our tool, optimize its existing features, and extend its functionality with new ones. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/info12090357 fatcat:hchg6kvop5e2vebzez4ig5jelu

CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning

ZengGuang Liu, XiaoChun Yin, Yuemei Hu
2020 IEEE Access  
Denial-of-Service (LR-DDoS) attacks, especially in the edge environment.  ...  Existing intrusion detection and defense models for CPSS (Cyber-Physical-Social Systems) are based on analyzing the static intrusion characteristics, which cannot effectively detect large-scale Low-Rate  ...  buckets with same hash values; 12: Generate HashTable based on buckets.  ... 
doi:10.1109/access.2020.2976706 fatcat:7azagv5yw5ddlcduwuwvf6aeiu

Classification of the SHA-3 Candidates

Ewan Fleischmann, Christian Forler, Michael Gorski
2009 unpublished
In this note we give an overview on the current state of the SHA-3 candidates.  ...  We define performance classes and classify the hash algorithms. Note, that this article will be updated as soon as new candidates arrive or new cryptanalytic results get published.  ...  Collision Attack The best known collision attack that is better than the birthday attack.  ... 
fatcat:v7nv2tueevffffq7fxoudyzkqe

Beyond the lock icon: real-time detection of phishing websites using public key certificates

Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp
2015 2015 APWG Symposium on Electronic Crime Research (eCrime)  
Other local client-side phishing detection approaches also exist, but primarily rely on page content or URLs, which are arguably easier to manipulate by attackers.  ...  Due to the potentially significant lag prior to site blacklisting, there is a window of opportunity for attackers.  ...  The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1109/ecrime.2015.7120795 dblp:conf/ecrime/DongKBC15 fatcat:u3iplbeft5hrdkdwfgoj2et2tu

A Text Book Of Research Papers On Fingerprint Recognition & Hash Code Techniques

K. Dr. Krishna Prasad
2018 Zenodo  
This Book has written with an intention to get all papers together under one roof, which will benefit all the researchers of related areas.  ...  This book contains research articles related to Fingerprint image enhancement, recognition and Hash code generation methods.  ...  collision-free Hash code and for effective user identification.  ... 
doi:10.5281/zenodo.1409464 fatcat:243353fegrfxji7jvxzmqg5sge

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs.  ...  We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.  ...  Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Internet of things: where to be is to trust

Raquel Lacuesta, Guillermo Palacios-Navarro, Carlos Cetina, Lourdes Peñalver, Jaime Lloret
2012 EURASIP Journal on Wireless Communications and Networking  
Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behavior.  ...  Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection.  ...  hash when we pass a hash function to the user's data.  ... 
doi:10.1186/1687-1499-2012-203 fatcat:mxjvtagyyjfvhdflcbl2ksviiu

Azure Accelerated Networking: SmartNICs in the Public Cloud

Daniel Firestone, Andrew Putnam, Sambrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian M. Caulfield, Eric S. Chung, Harish Kumar Chandrappa, Somesh Chaturmohta (+20 others)
2018 Symposium on Networked Systems Design and Implementation  
to the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation is sponsored by USENIX.  ...  This paper is included in the Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18).  ...  We thank the entire Azure Networking, Server Infrastructure, and Compute teams for their support in developing, iterating on, and deploying SmartNICs and the Accelerated Networking service.  ... 
dblp:conf/nsdi/FirestonePMCDAA18 fatcat:gx7eaiwfvzhnxjfbyap3p5bcue
« Previous Showing results 1 — 15 out of 58 results