A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
DEMO
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
The design will show how this high-throughput three-party computation can be done using simple servers. ...
The paper "High Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority" in this ACM CCS 2016 [4] presents a new protocol which its implementation carried out over 1,300,000 AESs ...
First, we simulate the three party computation for issuing Kerberos TGT tickets by these server machines where the JMeter load test tool simulates clients. ...
doi:10.1145/2976749.2989035
dblp:conf/ccs/ArakiBFLNO16
fatcat:wb2ga5nyv5hutldzzk6v3wydqe
CyberGuarder: A virtualization security assurance architecture for green cloud computing
2012
Future generations computer systems
In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service. ...
His research interests include a broad range of topics related to computer security including virtualisation security, operating system security, and trusted computing. ...
In particular, the top 10 problems relating to cloud computing are discussed, and three of them are related to the security issues. ...
doi:10.1016/j.future.2011.04.012
fatcat:aruwngb4prdlrdfavutbhjx6ei
Aspect-Oriented Workflow Languages
[chapter]
2006
Lecture Notes in Computer Science
and Kerberos tickets. ...
However, they involve several heterogeneous information systems and pose high requirements w.r.t. throughput, transaction, reliability, and security. ...
doi:10.1007/11914853_12
fatcat:w6fjrahnyfefnbn5a7wpnjxazy
INTEGRATING SECURITY AND PRIVACY PROTECTION INTO A MOBILITY-CENTRIC INTERNET ARCHITECTURE Integrating Security and Privacy Protection into a Mobility-Centric Internet Architecture
unpublished
This thesis examines several of the key security challenges facing several of the emerging future Internet designs, and specifically explores aspects related to securing the MobilityFirst future Internet ...
Notably, one of the primary hurdles challenging the continued success of the Internet is the security of the communications crossing the Internet. ...
Kerberos is another widely used three-party key distribution protocol based on Needham-Schroeder protocol. ...
fatcat:pdqgsd35irhmdmoayxuz6tdndm
Privacy engineering for social networks
2013
The protocol is designed to be secure even in the face of malicious authentication agents. ...
It is designed to compete with the performance of today's centralised OSNs, but it does not trust centralised infrastructure to enforce security properties. ...
As described below, these three requirements preclude traditional approaches to the security of private keys. ...
doi:10.17863/cam.16377
fatcat:g3dkqo7ugrc7fcnpz4d6mc2l6m
Editorial Team Manuscript Editor Advisory Board II JAQM Advisory Board
unpublished
Acknowledgements This work was partially supported by the Internal Funding Program of the Shamoon College of Engineering (SCE). ...
One of the most powerful and widely used authentication service is Kerberos Authentication Server. Kerberos is a set of protocols that can be used to authenticate access to a computer. ...
Also, Kerberos provides real-time authentication in an insecure distributed environment.
Advantages of computer network security under UNIX Unix system's strengths are numerous. ...
fatcat:r4jukbisc5bm7ck66rd6cyyulq
21st CERN School of Computing
[article]
1998
An overview of some applications of expert systems to monitoring and control will be given, as well as some alternative approaches. ...
Expert Systems offer the means to codify and automate the use of the knowledge of the best experts in a given domain, and may provide support to monitoring, diagnosis and control tasks. ...
for their generous support. ...
doi:10.5170/cern-1998-008
fatcat:pn2eegutc5gq7bo2364atduiy4
Supporting Password-Security Decisions with Data
2018
I also examine the relationship between users' perceptions of password security and passwords' actual security, finding that while users often correctly judge the security impact of individual password ...
Despite decades of research into developing abstract security advice and improving interfaces, users still struggle to make passwords. ...
Furthermore, cryptographic keys used for asymmetric secure messaging (e.g., GPG private keys), encrypted hard drives, and Windows Domain Kerberos Tickets [44] are protected by passwords. ...
doi:10.1184/r1/6723416
fatcat:zj5suvg2kjfmpkavs4fg6r2kvm