A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Handling exp,× (and Timestamps) in Protocol Analysis
[chapter]
2006
Lecture Notes in Computer Science
In the example of Sect. 4.1, we consider exp, ×, 1, and (•) −1 , axiomatizing their interactions with twelve equations. ...
We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus. ...
The algorithm in [23] was adapted to handle I and is the basis for our analysis tool. ...
doi:10.1007/11690634_28
fatcat:qedmw4fzjzagnodxltzkewnmfu
Timestamping Documents and Beliefs
[article]
2021
arXiv
pre-print
Documents are a good source of information and are used for many tasks like, sentiment analysis, classification of reviews etc. ...
We also pointed out some limitations of NeuralDater and tried to utilize both context and temporal information in documents in a more flexible and intuitive manner proposing AD3: Attentive Deep Document ...
We handle both direction and label by incorporating label and direction specific filters. ...
arXiv:2106.14622v1
fatcat:ilx3xrcmszdm3fai55f2fxcaxi
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
[article]
2021
IACR Cryptology ePrint Archive
Buldas, Laanoja, and Truu designed a family of server-assisted digital signature schemes (BLT signatures) built around cryptographic timestamping and forward-resistant tag systems. ...
We prove that the proposed tag system is forward-resistant and when combined with cryptographic timestamping, it induces a secure (existentially unforgeable) multiple-time signature scheme. ...
DISCUSSION We found that in EasyCrypt it is relatively simple to define protocols and interaction among different actors of a protocol (i.e., signing oracles, timestamping service, adversaries). ...
dblp:journals/iacr/FirsovLT21
fatcat:rk4ib3b5rbbvfcq3wtkaagvoeq
An Analysis of Concurrency Control Protocols for In-Memory Databases with CCBench (Extended Version)
[article]
2021
arXiv
pre-print
The code for CCBench and all the data in this paper are available online at GitHub. ...
We analyzed the protocols and optimization methods using various workload parameters and a thread count of 224. ...
MVTO, which could be handled by aborting the transac- workload parameters with the number of threads fixed at
tion and retrying it with a new timestamp. ...
arXiv:2009.11558v2
fatcat:276w3o4jdrdy5cs5guk4iyixaa
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges
2020
IEEE Access
A detailed comparative analysis among various state-of-art authentication protocols proposed in the related IoV environment is provided to show their effectiveness as well as security and functionality ...
In addition, some future challenges for IoV security protocols are also highlighted that are necessary to address in the future. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Associate Editor for their valuable feedback on the paper which helped us to improve its quality as well as presentation. ...
doi:10.1109/access.2020.2981397
fatcat:mnndbufii5dudeiexbv7gj2jra
A Unification Algorithm for Analysis of Protocols with Blinded Signatures
[chapter]
2005
Lecture Notes in Computer Science
Analysis of authentication cryptographic protocols, particularly finding flaws in them and determining a sequence of actions that an intruder can take to gain access to the information which a given protocol ...
Relations among encryption and decryption functions as well as properties of number theoretic functions used in encryption and decryption can be specified as rewrite rules. ...
This, for example, is the approach used by the NRL Protocol Analyzer (NPA) [13] , a software tool for cryptographic protocol analysis implemented in Prolog. ...
doi:10.1007/978-3-540-32254-2_25
fatcat:a5tcdldv2bdohd4u3xlnexsrpq
A survey of algebraic properties used in cryptographic protocols
2006
Journal of Computer Security
Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. ...
We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols. ...
Acknowledgments The authors would like to thank anonymous referees for their very helpful comments and Ralf Treinen to have read a preliminary version of this survey. ...
doi:10.3233/jcs-2006-14101
fatcat:offe7jsai5e5rl7jswiccgsyiq
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
2010
Computer Communications
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. ...
In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. ...
the context of the 6th Framework Programme through the BIONETS Project (www.bionets.eu), and in part by the Mobile Innovation Center (www.mik.bme.hu). ...
doi:10.1016/j.comcom.2010.01.014
fatcat:iza5undcqfaprnj2jh2eybyrha
TPMC: A Model Checker For Time–Sensitive Security Protocols
2009
Journal of Computers
In this work we present a model checking tool for the analysis of security protocols which employs THLPSL as a specification language and UPPAAL as the model checking engine. ...
In this paper we face the problem of verifying security protocols where temporal aspects explicitly appear in the description. ...
In this paper we describe the TPMC (Timed Protocols Model Checker) tool we developed for the analysis of timed security protocols. ...
doi:10.4304/jcp.4.5.366-377
fatcat:3j4anfns6nak5dtd5s5pk3ekua
Computationally secure two-round authenticated message exchange
2010
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10
by timestamps and payloads with signed parts. ...
Our security analysis is a computational analysis in the Bellare-Rogaway style and thus provides strong guarantees; it is novel from a technical point of view since we extend the Bellare-Rogaway framework ...
In [16, 10] symbolic models for protocols with timestamps are introduced and techniques to analyze protocols within these models are described. ...
doi:10.1145/1755688.1755715
dblp:conf/ccs/KurtzSW10
fatcat:nkg7gfhmabc2lnsrwzzjy5n3bi
SQL query based data synchronization in heterogeneous database environment
2012
2012 International Conference on Computer Communication and Informatics
In this paper we present a methodology to synchronize data and structure in heterogeneous database envrionment. ...
A process runs continuously in the back end to read SQL query and passes the SQL query to target system through HTTP. Another process processes the SQL query in the target system. ...
ACKNOWLEDGEMENT This work is part of a Master's thesis work done in the Department of Computer Science and Engineering (CSE) at Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh ...
doi:10.1109/iccci.2012.6158818
fatcat:2rmpe4ykdfh4nnx23qpoc5rvvq
Lightweight authentication protocol in edge-based smart grid environment
2021
EURASIP Journal on Wireless Communications and Networking
For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. ...
Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG. ...
SM anonymity and untraceability attack In our protocol, the random numbers n i and n j and timestamp T i , T i are used in the login and authentication phase. ...
doi:10.1186/s13638-021-01930-6
fatcat:65hvpgpotrhhthevvngpj7xeeq
Adaptive time warp simulation of timed Petri nets
1999
IEEE Transactions on Software Engineering
By monitoring and statistically analyzing the arrival processes of synchronization messages, TW simulation progress is probabilistically throttled based on the forecasted timestamp of forthcoming messages ...
The sensitivity of the adaptive optimism control with respect to forecast accuracy and computational overhead is analyzed for very large Petri net simulation models executed with the TW protocol on the ...
process analysis and message timestamp prediction (we shall refer to the amount of potentially simultaneous occurrences of transition firings as model parallelism, and intend to execute as many as possible ...
doi:10.1109/32.761448
fatcat:6edbvxwbqbeddj5spxgdeicfia
The End of a Myth: Distributed Transactions Can Scale
[article]
2016
arXiv
pre-print
In this paper, we present the design of our novel scalable database system NAM-DB and show that distributed transactions with the very common Snapshot Isolation guarantee can indeed scale using the next ...
But what if distributed transactions could be made scalable using the next generation of networks and a redesign of distributed databases? ...
In addition, the oracle is involved in message passing and executes a timestamp management thread that needs to handle the result of each transaction and advance the read timestamp. ...
arXiv:1607.00655v2
fatcat:4aktawyrczchfg65ojcabzcfhi
Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion
[article]
2021
arXiv
pre-print
Experiments are conducted on all available smart contracts with source code in two platforms, Ethereum and VNT Chain. Empirically, our system significantly outperforms state-of-the-art methods. ...
Thereafter, the global graph feature and local expert patterns are fused to cooperate and approach the final prediction, while yielding their interpretable weights. ...
In this respect, our work has an edge in explicitly modeling key variables and abling to handle complex semantics. ...
arXiv:2106.09282v1
fatcat:llth2grnmrcsfgxx2e72jb2mha
« Previous
Showing results 1 — 15 out of 1,924 results