Filters








173 Hits in 6.6 sec

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
7 Quantum Safe Cryptography and Security 8 2 Overview What is cryptography and how is it used? Cryptography is literally the art of "secret writing".  ...  One value is made public and is called the public key. Quantum Safe Cryptography and Security 59 Key Size: The number of bits of the key used in a cryptographic primitive.  ...  However some very early versions of S/MIME may present backward-compatibility issues.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works.  ...  First, we review the main contents of the selected papers and classify them into 24 topics.  ...  Moreover, it is backward compatible with the existing scheme used by ERTMS and accounts for the standardization of postquantum cryptography, as the ERTMS is designed with a long lifespan.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security.  ...  Consequently, the advancing research related to IoT security, especially with respect to product lifecycle, is explored through state-of-the-art developments in the domain of product lifecycle security  ...  of Finland (Open Messaging Interface; grant 296096).  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures [article]

Jens Hiller, Johanna Amann, Oliver Hohlfeld
2020 arXiv   pre-print
In this paper, we systematically analyze the present and past state of cross-signing in the Web PKI.  ...  However, cross-signing also enables fast bootstrapping of new CAs, e.g., Let's Encrypt, and achieves a non-disruptive user experience by providing backward compatibility.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators, and do not necessarily reflect the views of the National Science Foundation  ... 
arXiv:2009.08772v1 fatcat:vo3cdpydj5bhpk5s565g3ystfi

Some Simple Economics of the Blockchain

Christian Catalini, Joshua S. Gans
2016 Social Science Research Network  
The cost of verification relates to the ability to cheaply verify state, including information about past transactions and their attributes, and current ownership in a native digital asset.  ...  We identify two key costs affected by the technology: the cost of verification and the cost of networking.  ...  to perform a 51% attack. 23 The process through which consensus on the true state of a distributed ledger is reached and secured over time has implications for market design.  ... 
doi:10.2139/ssrn.2874598 fatcat:3ab7mhd5bnfapjbitzqkey6fj4

The Birth of Quantum Computing [chapter]

2021 Law and Policy for the Quantum Age  
This is the first of three chapters on quantum computing.  ...  just how early we are in the development of these machines.  ...  For example, in 2019 Google released a paper describing an approach for factoring the large integers used in cryptography in hours, stating that such a machine would require twenty million state-of-the-art  ... 
doi:10.1017/9781108883719.008 fatcat:qeesind6ofbtflvrr2dftgl334

SoK: Hardware Security Support for Trustworthy Execution [article]

Lianying Zhao, He Shuang, Shengjie Xu, Wei Huang, Rongzhen Cui, Pushkar Bettadpur, David Lie
2019 arXiv   pre-print
In recent years, there have emerged many new hardware mechanisms for improving the security of our computer systems.  ...  In this paper, we systematize these approaches through the lens of abstraction. Abstraction is key to computing systems, and the interface between hardware and software contains many abstractions.  ...  of state-of-the-art hardware security features and the proposal of new hardware enhancements in the literature, based on their properties from the perspective of abstraction.  ... 
arXiv:1910.04957v1 fatcat:5luczjg34ve67nm73xso5xhzx4

Keys under doormats

Harold "Hal" Abelson, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie (+3 others)
2015 Communications of the ACM  
In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data.  ...  In the wake of the growing economic and social cost of the fundamental insecurity of today's Internet environment, any proposals that alter the security dynamics online should be approached with caution  ...  We found at that time that it was beyond the technical state of the art to build key escrow systems at scale.  ... 
doi:10.1145/2814825 fatcat:scbxwuxcknd3dnkm3bb2nzpfxy

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller (+3 others)
2015 Journal of Cybersecurity  
In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data.  ...  After lengthy debate and vigorous predictions of enforcement channels "going dark," these attempts to regulate security technologies on the emerging Internet were abandoned.  ...  The MIT Internet Policy Research Initiative, supported by the Hewlett Foundation and the Ford Foundation, convened the authors and helped to produce the final version of this paper.  ... 
doi:10.1093/cybsec/tyv009 dblp:journals/cybersecurity/AbelsonABBBDGG015 fatcat:s3c4maqnezg7jiuqtu2nw5cejm

Topic Modeling with Wasserstein Autoencoders [article]

Feng Nan, Ran Ding, Ramesh Nallapati, Bing Xiang
2019 arXiv   pre-print
To measure the diversity of the produced topics, we propose a simple topic uniqueness metric.  ...  We exploit the structure of the latent space and apply a suitable kernel in minimizing the Maximum Mean Discrepancy (MMD) to perform distribution matching.  ...  This highlights the importance of randomness in the WAE framework on the one hand and the importance of Dirichlet assumption in the topic model on the other hand.  ... 
arXiv:1907.12374v2 fatcat:gorwfy4lgnfejk54ifu3v2jsoa

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
There are potentially interesting attack vectors if Swarm and ENS became mainstream the use of a bad resolvers in new "Dapps" for example.  ...  There are potentially interesting attack vectors if Swarm and ENS became mainstream the use of a bad resolvers in new "Dapps" for example.  ...  Provide low network latency, fast verification and compatibility with low power devices. 6. Resilience to fraud and denial-of-service attacks. 7.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  D2.1 Vision, State of the Art and Requirements Analysis V1.1 © GUARD 2020  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

Topic Modeling with Wasserstein Autoencoders

Feng Nan, Ran Ding, Ramesh Nallapati, Bing Xiang
2019 Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics  
To measure the diversity of the produced topics, we propose a simple topic uniqueness metric.  ...  We exploit the structure of the latent space and apply a suitable kernel in minimizing the Maximum Mean Discrepancy (MMD) to perform distribution matching.  ...  This highlights the importance of randomness in the WAE framework on the one hand and the importance of Dirichlet assumption in the topic model on the other hand.  ... 
doi:10.18653/v1/p19-1640 dblp:conf/acl/NanDNX19 fatcat:hqanr3yzmfbdvj32jrc5vbr6mu

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
The main objectives of this deliverable are (i) to describe the project vision, the applicability scenarios, and demonstration use cases; (ii) to perform an analysis of the State of the Art and current  ...  market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework.  ...  • Threats o APIs deprecations and breaking backwards compatibility. o APIs can expose too much data.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  the client is depending on (break backward compatibility).  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa
« Previous Showing results 1 — 15 out of 173 results