Filters








30 Hits in 3.2 sec

Footprint Scheduling for Dining-Cryptographer Networks [chapter]

Anna Krasnova, Moritz Neikes, Peter Schwabe
2017 Lecture Notes in Computer Science  
We propose footprint scheduling as a new technique for participants to negotiate communication slots without losing anonymity and at the same time hiding the number of actively sending users.  ...  Footprint scheduling is at the same time simple, efficient and yields excellent results, in particular in very dynamic networks with a frequently changing set of participants and frequently changing activity  ...  This research was conducted within the Privacy and Identity Lab (PI.lab, http://www.pilab.nl) and funded by SIDN.nl (http://www.sidn.nl/) and by Netherlands Organisation for Scientific Research (NWO) through  ... 
doi:10.1007/978-3-662-54970-4_23 fatcat:nsbaupsqjjhavdzniryoc6e6tq

A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking [chapter]

Tom van Dijk, Ernst Moritz Hahn, David N. Jansen, Yong Li, Thomas Neele, Mariëlle Stoelinga, Andrea Turrini, Lijun Zhang
2015 Lecture Notes in Computer Science  
In this paper, we provide the first comparative study of the performance of various BDD/MTBDD packages for this purpose.  ...  We provide experimental results for several well-known probabilistic benchmarks and study the effect of several optimisations.  ...  File System model [6] ("google"), the Asynchronous Leader Election protocol [21] ("leader"), the Dining Cryptographers protocol [11] ("dining-crypt"), the Dining Philosophers protocol with no fairness  ... 
doi:10.1007/978-3-319-25942-0_3 fatcat:jtfcnc2qwfdzbebwvfol5mkjbe

X-search

Sonia Ben Mokhtar, Antoine Boutet, Pascal Felber, Marcelo Pasin, Rafael Pires, Valerio Schiavoni
2017 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference on - Middleware '17  
Existing solutions are either too costly due to the heavy use of cryptographic mechanisms (e.g., private information retrieval protocols), subject to attacks (e.g., Tor, TrackMeNot, GooPIR) or rely on  ...  However, its performance is even worse than the one of RAC as it is a combination of two heavy cryptographic protocols: the dining cryptographers protocol (DC-NET) [7] and a data mining protocol used  ...  The CPU keeps a cryptographic hash for the memory pages assigned to each enclave.  ... 
doi:10.1145/3135974.3135987 dblp:conf/middleware/MokhtarBFPPS17 fatcat:coyko2m67vcnllruu2cbgp47uy

SGX-LKL: Securing the Host OS Interface for Trusted Execution [article]

Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A. Sartakov, Peter Pietzuch
2020 arXiv   pre-print
Runtime systems for the trusted execution must rely on an interface to the untrusted host OS to use external resources such as storage, network, and other functions.  ...  a complete library OS inside the enclave, including file system and network stacks, which requires a host interface with only 7 calls; (ii) protected because SGX-LKL transparently encrypts and integrity-protects  ...  Dining Cryptographers (DC) networks [19, 91, 113] provide stronger guarantees by broadcasting messages to all users, but incur a high overhead.  ... 
arXiv:1908.11143v3 fatcat:7pe2tnuxpfcybania4s3n2nu4q

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  Finally, the authors propose an extension of their scheme to support the anonymity of all bidders by blinding RSA signatures and Dining Cryptographers (DC) network.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

Science and Technology Parks: A Futuristic Approach

Imran Makhdoom, Justin Lipman, Mehran Abolhasan, Duncan Challen
2022 IEEE Access  
Some of these traditional measures include business support, workspaces, laboratories, networking events, accommodation, and essential commodities.  ...  Finally, the components deemed essential for the attainment of science and technology parks objectives are highlighted.  ...  systems locally. 15) Provide excellent and cost-effective services (including accommodation, dining, workspace, business support, leisure, networking venues, etc.)  ... 
doi:10.1109/access.2022.3159798 fatcat:6tnosyhsqnfspbszbgx7dxcvaq

Prometheus wired: the hope for democracy in the age of network technology

2001 ChoiceReviews  
, courage and friendship; Mary Stone for her love and for nailing my ass to the facts; Ronald Beiner and Richard Simeon for their support, advice, and criticism.  ...  However, the choice of fire as a counterpoint to computer networks is probably more interesting than the audacity of this pronouncement.  ...  Typically, work sites in the home are not even separated physically from general living and social spaces, with networked terminals set up in bedrooms, dining areas or family rooms.  ... 
doi:10.5860/choice.38-2996 fatcat:r6oqbybt7rhx5acnwrai6rszny

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
I also thank Tuomas Sandholm for feedback on the kidney exchange section, and David Pennock for feedback on the prediction markets section.  ...  I thank the reviewers for very detailed and helpful feedback.  ...  Such encryption schemes are immensely useful in the design of complex cryptographic protocols.  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

Temporal analysis and scheduling of hard real-time radios running on a multi-processor [article]

Moreira, O (Orlando), Corporaal, H (Henk), Berkel, CH (Kees) Van, Geilen, MCW (Marc)
2012
Acknowledgements Through the process of moving to a different country and working on industrial research for eleven years and three companies, I have met many people who taught me, inspired me, or influenced  ...  It has a low memory footprint: the Network Manager is less than 10 KByte of ARM7 thumb code and the SoD SK (Streaming Kernel) code is less than 1 KByte.  ...  SoD is designed to function with minimal demands on memory footprint and cycle budget.  ... 
doi:10.6100/ir724538 fatcat:py3zckzeajek7pzlteuvv2toai

Securing applications using trusted execution environments

Joshua David Lind, Peter Pietzuch
2021
To minimise the TCB of applications and reduce the risk of vulnerabilities, we propose automatic application partitioning for TEEs: a principled approach for partitioning existing applications to be deployed  ...  Trusted execution environments (TEEs) have recently emerged as a powerful primitive for securing applications and protecting sensitive data.  ...  Dining Cryptographers (DC) networks [Cha88, WCGFJ12, SGRE04] provide stronger guarantees by broadcasting messages to all users, but incur a high overhead.  ... 
doi:10.25560/87392 fatcat:sx5234bmtfhurkg726qx2pfsuu

2014 Jahresbericht Annual Report

Registernummer Amtsgericht, Saarbrücken Hrb, Vorsitzender Des Aufsichtsrates, Ing, Jähnichen Stefan, Raimund Geschäftsführung, Seidel, Heike Meißner, Technisch-Administrative Geschäftsführerin, Gesellschafter
unpublished
Techniques for data compression or application-specific checkpointing (with a reduced memory footprint) were proposed as a solution, but they only alleviate the problem by a certain extent.  ...  The seminar schedule involved three days of scheduled talks, followed by two days of free-form discussions, demos, and working groups.  ... 
fatcat:jojclrrbifa2lgyh3ux4tv7tiu

The Passions and the Interests: Unpacking the 'Sharing Economy'

Cristiano Codagnone, Federico Biagi, Fabienne Abadie
2016 Social Science Research Network  
Digital platforms generally placed under the 'sharing economy' and various other labels match different groups of users and providers and enable the increase in scale and speed for traditional transactions  ...  This loop, in turn, limits the space for a rational debate of alternative policy options and contributes to the fragmented regulatory approaches which currently address the 'sharing economy'.  ...  those who are travelling. lii Bitcoin is a decentralised electronic cash system that uses peer-to-peer networking, digital signatures and cryptographic proof so as to enable users to conduct irreversible  ... 
doi:10.2139/ssrn.2793901 fatcat:bpayzisofngsdo6quqzvjuouka

Symmetry, Almost

Amanda Folsom
2019 Notices of the American Mathematical Society  
The AMS is not responsible for rate changes or for the quality of the accommodations. Hotels have varying cancellation and early checkout penalties; be sure to ask for details.  ...  For the latest information, see www.ams.org/amsmtgs/sectional.html.  ...  For a map and schedule, please visit: www.auburn.edu/administration/parking_transit/transit/index.php.  ... 
doi:10.1090/noti1775 fatcat:xwrijzvqazg7bdym7un5qq2jjq

2016 Jahresbericht Annual Report

Jähnichen Stefan, Raimund Geschäftsführung, Seidel, Meißner Heike, Gesellschafter
unpublished
Special thanks go to the Schloss Dagstuhl team for its extremely friendly support during the preparation phase and for the warm welcome at Schloss Dagstuhl. Acknowledgments.  ...  The seminar organizers would like to thank Infineon Technologies AG for their support of the seminar.  ...  Cryptographic designs must scale towards high-performance, high-throughput implementations while it must also accommodate small-footprint, low-latency designs.  ... 
fatcat:oef4sw3ebbcwhe7qbtizni4lfy
« Previous Showing results 1 — 15 out of 30 results