1,924 Hits in 4.7 sec

Handling exp,× (and Timestamps) in Protocol Analysis [chapter]

Roberto Zunino, Pierpaolo Degano
2006 Lecture Notes in Computer Science  
In the example of Sect. 4.1, we consider exp, ×, 1, and (•) −1 , axiomatizing their interactions with twelve equations.  ...  We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus.  ...  The algorithm in [23] was adapted to handle I and is the basis for our analysis tool.  ... 
doi:10.1007/11690634_28 fatcat:qedmw4fzjzagnodxltzkewnmfu

Timestamping Documents and Beliefs [article]

Swayambhu Nath Ray
2021 arXiv   pre-print
Documents are a good source of information and are used for many tasks like, sentiment analysis, classification of reviews etc.  ...  We also pointed out some limitations of NeuralDater and tried to utilize both context and temporal information in documents in a more flexible and intuitive manner proposing AD3: Attentive Deep Document  ...  We handle both direction and label by incorporating label and direction specific filters.  ... 
arXiv:2106.14622v1 fatcat:ilx3xrcmszdm3fai55f2fxcaxi

Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping [article]

Denis Firsov, Henri Lakk, Ahto Truu
2021 IACR Cryptology ePrint Archive  
Buldas, Laanoja, and Truu designed a family of server-assisted digital signature schemes (BLT signatures) built around cryptographic timestamping and forward-resistant tag systems.  ...  We prove that the proposed tag system is forward-resistant and when combined with cryptographic timestamping, it induces a secure (existentially unforgeable) multiple-time signature scheme.  ...  DISCUSSION We found that in EasyCrypt it is relatively simple to define protocols and interaction among different actors of a protocol (i.e., signing oracles, timestamping service, adversaries).  ... 
dblp:journals/iacr/FirsovLT21 fatcat:rk4ib3b5rbbvfcq3wtkaagvoeq

An Analysis of Concurrency Control Protocols for In-Memory Databases with CCBench (Extended Version) [article]

Takayuki Tanabe, Takashi Hoshino, Hideyuki Kawashima, Jun Nemoto, Masahiro Tanaka, Osamu Tatebe
2021 arXiv   pre-print
The code for CCBench and all the data in this paper are available online at GitHub.  ...  We analyzed the protocols and optimization methods using various workload parameters and a thread count of 224.  ...  MVTO, which could be handled by aborting the transac- workload parameters with the number of threads fixed at tion and retrying it with a new timestamp.  ... 
arXiv:2009.11558v2 fatcat:276w3o4jdrdy5cs5guk4iyixaa

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Youngho Park
2020 IEEE Access  
A detailed comparative analysis among various state-of-art authentication protocols proposed in the related IoV environment is provided to show their effectiveness as well as security and functionality  ...  In addition, some future challenges for IoV security protocols are also highlighted that are necessary to address in the future.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Associate Editor for their valuable feedback on the paper which helped us to improve its quality as well as presentation.  ... 
doi:10.1109/access.2020.2981397 fatcat:mnndbufii5dudeiexbv7gj2jra

A Unification Algorithm for Analysis of Protocols with Blinded Signatures [chapter]

Deepak Kapur, Paliath Narendran, Lida Wang
2005 Lecture Notes in Computer Science  
Analysis of authentication cryptographic protocols, particularly finding flaws in them and determining a sequence of actions that an intruder can take to gain access to the information which a given protocol  ...  Relations among encryption and decryption functions as well as properties of number theoretic functions used in encryption and decryption can be specified as rewrite rules.  ...  This, for example, is the approach used by the NRL Protocol Analyzer (NPA) [13] , a software tool for cryptographic protocol analysis implemented in Prolog.  ... 
doi:10.1007/978-3-540-32254-2_25 fatcat:a5tcdldv2bdohd4u3xlnexsrpq

A survey of algebraic properties used in cryptographic protocols

Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade
2006 Journal of Computer Security  
Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators.  ...  We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.  ...  Acknowledgments The authors would like to thank anonymous referees for their very helpful comments and Ralf Treinen to have read a preliminary version of this survey.  ... 
doi:10.3233/jcs-2006-14101 fatcat:offe7jsai5e5rl7jswiccgsyiq

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks

Levente Buttyán, László Dóra, Fabio Martinelli, Marinella Petrocchi
2010 Computer Communications  
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients.  ...  In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced.  ...  the context of the 6th Framework Programme through the BIONETS Project (, and in part by the Mobile Innovation Center (  ... 
doi:10.1016/j.comcom.2010.01.014 fatcat:iza5undcqfaprnj2jh2eybyrha

TPMC: A Model Checker For Time–Sensitive Security Protocols

Massimo Benerecetti, Nicola Cuomo, Adriano Peron
2009 Journal of Computers  
In this work we present a model checking tool for the analysis of security protocols which employs THLPSL as a specification language and UPPAAL as the model checking engine.  ...  In this paper we face the problem of verifying security protocols where temporal aspects explicitly appear in the description.  ...  In this paper we describe the TPMC (Timed Protocols Model Checker) tool we developed for the analysis of timed security protocols.  ... 
doi:10.4304/jcp.4.5.366-377 fatcat:3j4anfns6nak5dtd5s5pk3ekua

Computationally secure two-round authenticated message exchange

Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
by timestamps and payloads with signed parts.  ...  Our security analysis is a computational analysis in the Bellare-Rogaway style and thus provides strong guarantees; it is novel from a technical point of view since we extend the Bellare-Rogaway framework  ...  In [16, 10] symbolic models for protocols with timestamps are introduced and techniques to analyze protocols within these models are described.  ... 
doi:10.1145/1755688.1755715 dblp:conf/ccs/KurtzSW10 fatcat:nkg7gfhmabc2lnsrwzzjy5n3bi

SQL query based data synchronization in heterogeneous database environment

Md. Iqbal Hossain, Muhammad Masroor Ali
2012 2012 International Conference on Computer Communication and Informatics  
In this paper we present a methodology to synchronize data and structure in heterogeneous database envrionment.  ...  A process runs continuously in the back end to read SQL query and passes the SQL query to target system through HTTP. Another process processes the SQL query in the target system.  ...  ACKNOWLEDGEMENT This work is part of a Master's thesis work done in the Department of Computer Science and Engineering (CSE) at Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh  ... 
doi:10.1109/iccci.2012.6158818 fatcat:2rmpe4ykdfh4nnx23qpoc5rvvq

Lightweight authentication protocol in edge-based smart grid environment

Chien-Ming Chen, Lili Chen, Yanyu Huang, Sachin Kumar, Jimmy Ming-Tai Wu
2021 EURASIP Journal on Wireless Communications and Networking  
For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors.  ...  Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.  ...  SM anonymity and untraceability attack In our protocol, the random numbers n i and n j and timestamp T i , T i are used in the login and authentication phase.  ... 
doi:10.1186/s13638-021-01930-6 fatcat:65hvpgpotrhhthevvngpj7xeeq

Adaptive time warp simulation of timed Petri nets

A. Ferscha
1999 IEEE Transactions on Software Engineering  
By monitoring and statistically analyzing the arrival processes of synchronization messages, TW simulation progress is probabilistically throttled based on the forecasted timestamp of forthcoming messages  ...  The sensitivity of the adaptive optimism control with respect to forecast accuracy and computational overhead is analyzed for very large Petri net simulation models executed with the TW protocol on the  ...  process analysis and message timestamp prediction (we shall refer to the amount of potentially simultaneous occurrences of transition firings as model parallelism, and intend to execute as many as possible  ... 
doi:10.1109/32.761448 fatcat:6edbvxwbqbeddj5spxgdeicfia

The End of a Myth: Distributed Transactions Can Scale [article]

Erfan Zamanian, Carsten Binnig, Tim Kraska, Tim Harris
2016 arXiv   pre-print
In this paper, we present the design of our novel scalable database system NAM-DB and show that distributed transactions with the very common Snapshot Isolation guarantee can indeed scale using the next  ...  But what if distributed transactions could be made scalable using the next generation of networks and a redesign of distributed databases?  ...  In addition, the oracle is involved in message passing and executes a timestamp management thread that needs to handle the result of each transaction and advance the read timestamp.  ... 
arXiv:1607.00655v2 fatcat:4aktawyrczchfg65ojcabzcfhi

Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion [article]

Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, Shouling Ji
2021 arXiv   pre-print
Experiments are conducted on all available smart contracts with source code in two platforms, Ethereum and VNT Chain. Empirically, our system significantly outperforms state-of-the-art methods.  ...  Thereafter, the global graph feature and local expert patterns are fused to cooperate and approach the final prediction, while yielding their interpretable weights.  ...  In this respect, our work has an edge in explicitly modeling key variables and abling to handle complex semantics.  ... 
arXiv:2106.09282v1 fatcat:llth2grnmrcsfgxx2e72jb2mha
« Previous Showing results 1 — 15 out of 1,924 results