A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Footprint Scheduling for Dining-Cryptographer Networks
[chapter]
2017
Lecture Notes in Computer Science
We propose footprint scheduling as a new technique for participants to negotiate communication slots without losing anonymity and at the same time hiding the number of actively sending users. ...
Footprint scheduling is at the same time simple, efficient and yields excellent results, in particular in very dynamic networks with a frequently changing set of participants and frequently changing activity ...
This research was conducted within the Privacy and Identity Lab (PI.lab, http://www.pilab.nl) and funded by SIDN.nl (http://www.sidn.nl/) and by Netherlands Organisation for Scientific Research (NWO) through ...
doi:10.1007/978-3-662-54970-4_23
fatcat:nsbaupsqjjhavdzniryoc6e6tq
A Comparative Study of BDD Packages for Probabilistic Symbolic Model Checking
[chapter]
2015
Lecture Notes in Computer Science
In this paper, we provide the first comparative study of the performance of various BDD/MTBDD packages for this purpose. ...
We provide experimental results for several well-known probabilistic benchmarks and study the effect of several optimisations. ...
File System model [6] ("google"), the Asynchronous Leader Election protocol [21] ("leader"), the Dining Cryptographers protocol [11] ("dining-crypt"), the Dining Philosophers protocol with no fairness ...
doi:10.1007/978-3-319-25942-0_3
fatcat:jtfcnc2qwfdzbebwvfol5mkjbe
Existing solutions are either too costly due to the heavy use of cryptographic mechanisms (e.g., private information retrieval protocols), subject to attacks (e.g., Tor, TrackMeNot, GooPIR) or rely on ...
However, its performance is even worse than the one of RAC as it is a combination of two heavy cryptographic protocols: the dining cryptographers protocol (DC-NET) [7] and a data mining protocol used ...
The CPU keeps a cryptographic hash for the memory pages assigned to each enclave. ...
doi:10.1145/3135974.3135987
dblp:conf/middleware/MokhtarBFPPS17
fatcat:coyko2m67vcnllruu2cbgp47uy
SGX-LKL: Securing the Host OS Interface for Trusted Execution
[article]
2020
arXiv
pre-print
Runtime systems for the trusted execution must rely on an interface to the untrusted host OS to use external resources such as storage, network, and other functions. ...
a complete library OS inside the enclave, including file system and network stacks, which requires a host interface with only 7 calls; (ii) protected because SGX-LKL transparently encrypts and integrity-protects ...
Dining Cryptographers (DC) networks [19, 91, 113] provide stronger guarantees by broadcasting messages to all users, but incur a high overhead. ...
arXiv:1908.11143v3
fatcat:7pe2tnuxpfcybania4s3n2nu4q
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
2020
IEEE Communications Surveys and Tutorials
Blockchains are distributed systems, in which security is a critical factor for their success. ...
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer. ...
ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback. ...
doi:10.1109/comst.2020.3033665
fatcat:hcrsvvkb2ffmbdlspshy66wg2y
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
[article]
2020
arXiv
pre-print
Blockchains are distributed systems, in which security is a critical factor for their success. ...
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer. ...
Finally, the authors propose an extension of their scheme to support the anonymity of all bidders by blinding RSA signatures and Dining Cryptographers (DC) network. ...
arXiv:1910.09775v2
fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi
Science and Technology Parks: A Futuristic Approach
2022
IEEE Access
Some of these traditional measures include business support, workspaces, laboratories, networking events, accommodation, and essential commodities. ...
Finally, the components deemed essential for the attainment of science and technology parks objectives are highlighted. ...
systems locally. 15) Provide excellent and cost-effective services (including accommodation, dining, workspace, business support, leisure, networking venues, etc.) ...
doi:10.1109/access.2022.3159798
fatcat:6tnosyhsqnfspbszbgx7dxcvaq
Prometheus wired: the hope for democracy in the age of network technology
2001
ChoiceReviews
, courage and friendship; Mary Stone for her love and for nailing my ass to the facts; Ronald Beiner and Richard Simeon for their support, advice, and criticism. ...
However, the choice of fire as a counterpoint to computer networks is probably more interesting than the audacity of this pronouncement. ...
Typically, work sites in the home are not even separated physically from general living and social spaces, with networked terminals set up in bedrooms, dining areas or family rooms. ...
doi:10.5860/choice.38-2996
fatcat:r6oqbybt7rhx5acnwrai6rszny
Chasing the AIDS virus
2010
Communications of the ACM
I also thank Tuomas Sandholm for feedback on the kidney exchange section, and David Pennock for feedback on the prediction markets section. ...
I thank the reviewers for very detailed and helpful feedback. ...
Such encryption schemes are immensely useful in the design of complex cryptographic protocols. ...
doi:10.1145/1666420.1666440
fatcat:o2qllqh4tzhh5dzgvnjewl52vq
Temporal analysis and scheduling of hard real-time radios running on a multi-processor
[article]
2012
Acknowledgements Through the process of moving to a different country and working on industrial research for eleven years and three companies, I have met many people who taught me, inspired me, or influenced ...
It has a low memory footprint: the Network Manager is less than 10 KByte of ARM7 thumb code and the SoD SK (Streaming Kernel) code is less than 1 KByte. ...
SoD is designed to function with minimal demands on memory footprint and cycle budget. ...
doi:10.6100/ir724538
fatcat:py3zckzeajek7pzlteuvv2toai
Securing applications using trusted execution environments
2021
To minimise the TCB of applications and reduce the risk of vulnerabilities, we propose automatic application partitioning for TEEs: a principled approach for partitioning existing applications to be deployed ...
Trusted execution environments (TEEs) have recently emerged as a powerful primitive for securing applications and protecting sensitive data. ...
Dining Cryptographers (DC) networks [Cha88, WCGFJ12, SGRE04] provide stronger guarantees by broadcasting messages to all users, but incur a high overhead. ...
doi:10.25560/87392
fatcat:sx5234bmtfhurkg726qx2pfsuu
2014 Jahresbericht Annual Report
unpublished
Techniques for data compression or application-specific checkpointing (with a reduced memory footprint) were proposed as a solution, but they only alleviate the problem by a certain extent. ...
The seminar schedule involved three days of scheduled talks, followed by two days of free-form discussions, demos, and working groups. ...
fatcat:jojclrrbifa2lgyh3ux4tv7tiu
The Passions and the Interests: Unpacking the 'Sharing Economy'
2016
Social Science Research Network
Digital platforms generally placed under the 'sharing economy' and various other labels match different groups of users and providers and enable the increase in scale and speed for traditional transactions ...
This loop, in turn, limits the space for a rational debate of alternative policy options and contributes to the fragmented regulatory approaches which currently address the 'sharing economy'. ...
those who are travelling. lii Bitcoin is a decentralised electronic cash system that uses peer-to-peer networking, digital signatures and cryptographic proof so as to enable users to conduct irreversible ...
doi:10.2139/ssrn.2793901
fatcat:bpayzisofngsdo6quqzvjuouka
Symmetry, Almost
2019
Notices of the American Mathematical Society
The AMS is not responsible for rate changes or for the quality of the accommodations. Hotels have varying cancellation and early checkout penalties; be sure to ask for details. ...
For the latest information, see www.ams.org/amsmtgs/sectional.html. ...
For a map and schedule, please visit: www.auburn.edu/administration/parking_transit/transit/index.php. ...
doi:10.1090/noti1775
fatcat:xwrijzvqazg7bdym7un5qq2jjq
2016 Jahresbericht Annual Report
unpublished
Special thanks go to the Schloss Dagstuhl team for its extremely friendly support during the preparation phase and for the warm welcome at Schloss Dagstuhl.
Acknowledgments. ...
The seminar organizers would like to thank Infineon Technologies AG for their support of the seminar. ...
Cryptographic designs must scale towards high-performance, high-throughput implementations while it must also accommodate small-footprint, low-latency designs. ...
fatcat:oef4sw3ebbcwhe7qbtizni4lfy
« Previous
Showing results 1 — 15 out of 30 results