Filters








83 Hits in 4.8 sec

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols [article]

Luca Arnaboldi, Roberto Metere
2019 arXiv   pre-print
In this paper, we showcase the effectiveness of this novel approach by demonstrating how easy MetaCP makes it to design and verify a protocol going from the graphical design to formally verified protocol  ...  We propose MetaCP, a Meta Cryptography Protocol verification tool, as an automated tool simplifying the design of security protocols through a graphical interface.  ...  ACKNOWLEDGEMENT This research is supported by The Alan Turing Institute and an Innovate UK grant to Newcastle University through the e4future project, as well as Arm Ltd. and EPSRC under grant EP/N509528  ... 
arXiv:1910.02656v1 fatcat:v5a35t4jzvfslb2eq2cszgiqba

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

Sufian Hameed, Faraz Idris Khan, Bilal Hameed
2019 Journal of Computer Networks and Communications  
Demands of IoT have lately attracted huge attention, and organizations are excited about the business value of the data that will be generated by deploying such networks.  ...  On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation.  ...  A comprehensive state of the art in securing routing for WSN can be found in [49] . e authors proposed a schematic taxonomy of key design issues in WSN routing protocols and defined the design categorization  ... 
doi:10.1155/2019/9629381 fatcat:vivpgu4qz5c2to52msl3ydbpaq

DEMO

Denis Migdal, Christian Johansen, Audun Jøsang
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
The concept of Lucidman (Local User-Centric Identity Management) is an approach to providing scalable, secure and user friendly identity and authentication functionalities.  ...  The Lucidman/OffPAD approach consists of locating the identity management and authentication functionalities on the user side instead of on the server side or in the cloud.  ...  Cherrier (ENSI Caen GREYC lab), A. Taherkordi (Sonitor, manufacturer of indoor locating solutions).  ... 
doi:10.1145/2976749.2989033 dblp:conf/ccs/MigdalJJ16 fatcat:ooj5fk37afer5osfezlp6ahuxi

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review [article]

Faraz Idris Khan, Sufian Hameed
2018 arXiv   pre-print
Demands of IoT have lately attracted huge attention and organizations are excited about the business value of the data that will be generated by the IoT paradigm.  ...  On the other hand, IoT have various security and privacy concerns for the end users that limit its proliferation.  ...  The authors in [16] have presented security architecture for IP enabled IoT based on HIP (Host Identity Protocol) and DTLS ((Datagram Transport Layer Security) adapted to resource constrained devices  ... 
arXiv:1808.10529v1 fatcat:pmrn4vimyffo7don2yxlkh3moe

Privacy-by-Design(PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

V.Ragunatha Nadarajah, Manmeet Mahinderjit Singh
2017 Advances in Science, Technology and Engineering Systems  
Bloom filtering performed the hashing operation using MD5 technique as a verification of registered user to the NFC system.  ...  This help in term of elimination the duplicate tag and verify the receiving tag.  ...  Acknowledgment With grace of God, I managed to complete the research project. Even though I has faced a lot of difficulties upon completing of this research.  ... 
doi:10.25046/aj020116 fatcat:w62ga7wrmvatvniwz5jimmiqmi

NOMS 2020 Full Program

2020 NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium  
for Real-time and Stateful Unveiling the Features of Network Dynamics: a Data-Oriented Approach Author index Abdelmadjid Bouabdallah, UTC Using Machine Learning to Estimate the Optimal Transmission  ...  How does multiple providers and heterogeneity of monitoring tools impact the collection and dissemination of monitoring data in a distributed environment? What approaches can be used?  ... 
doi:10.1109/noms47738.2020.9110368 fatcat:nk5xudzdkrcbxil5u256aax5cy

The Survey on Near Field Communication

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2015 Sensors  
One study [23] deals with the increase of data rates for proximity coupling of NFC devices at 13.56 MHz, and compares the performance of the ASK and PSK modulation schemes in a real environment.  ...  Moreover, novel NFC transceiver and chipset design approaches have been studied [52] [53] [54] [55] [56] for improving communication quality and security.  ...  A smart poster model [202] is also studied in which the authors switch the role of NFC tag and reader for the implementation of smart posters.  ... 
doi:10.3390/s150613348 pmid:26057043 pmcid:PMC4507650 fatcat:ddxjqx2cebaopdxpg6jyctjsei

Detailed Program

2019 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)  
Secondary Use of Research Data: A Review of Availability and Utilization of Public Use Files and Initial Steps for the Development of a Process to Facilitate Medical Research Data Donation • Lena Otto.  ...  Data-Oriented Approach for the Dial-A-Ride Problem • Ahmad Alwadi, Abdulrahman Nahhas, Sascha Bosse, Naoum Jamous and Klaus Turowski.  ...  Its exceptional location in the heart of the capital has allowed the hotel to be a part of Abu Dhabi's community for 20 years.  ... 
doi:10.1109/aiccsa47632.2019.9035306 fatcat:iejcl2bj7jdfrgzgxkcckga22y

Emerging and Established Trends to Support Secure Health Information Exchange

Emmanouil G. Spanakis, Stelios Sfakianakis, Silvia Bonomi, Claudio Ciccotelli, Sabina Magalini, Vangelis Sakkalis
2021 Frontiers in Digital Health  
The research presented in this paper provides evidence and argumentation toward advanced and novel implementation strategies for a state-of-the-art information sharing environment; a description of high-level  ...  The technologies described and the possible implementation approaches are presented in the design of an innovative secure information sharing platform in the health-care domain.  ...  In the client/server case, data available for the sharing are copied and pushed toward a centralized TTP that will take care of satisfying the sharing request.  ... 
doi:10.3389/fdgth.2021.636082 pmid:34713107 pmcid:PMC8521812 fatcat:i7gqfr3tufht5bsjkpvvap3zhu

Layer-based Privacy and Security Architecture for Cloud Data Sharing

Ishu Gupta, Niharika Singh, Ashutosh Kumar Singh
2019 Journal of Communications Software and Systems  
The management of data while maintaining its utility and preservation of security scheme is a matter of concern for the cloud owner.  ...  To make a balance between data security and utility, the proposed approach categorizes the data according to its sensitivity.  ...  His research area includes Web Technology, Big Data, Verification, Synthesis, Design and Testing of Digital Circuits.  ... 
doi:10.24138/jcomss.v15i2.617 fatcat:tqv445wf3vcxvf6l2dkbowvk7i

Decentralized and Self-Sovereign Identity: Systematic Mapping Study

Spela Cucko, Muhamed Turkanovic
2021 IEEE Access  
CONCLUSION Decentralized identity narrowly Self-Sovereign Identity (SSI) is a new, user-centric approach to digital identity on the internet that has emerged with the rise of decentralized technologies  ...  Furthermore, with the use of decentralized technologies and cryptographic primitives, security and privacy are enhanced, and transparency and data minimization can be achieved.  ... 
doi:10.1109/access.2021.3117588 fatcat:77dchqdr2zhztfhpnummxdp7ty

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage  ...  The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate.  ...  Additionally, the MPSs usually incorporate a significant amount of cryptographic verification and hence are mostly used in static content distribution systems.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
As a zero-trust alternative, peer-to-peer (P2P) technologies promise networks that are self organizing and secure-by-design, in which the final data sovereignty lies at the corresponding user.  ...  While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store.  ...  Additionally, the MPSs usually incorporate a significant amount of cryptographic verification and hence are mostly used in static content distribution systems.  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

"When perhaps the real problem is money itself!": the practical materiality of Bitcoin

Bill Maurer, Taylor C. Nelms, Lana Swartz
2013 Social Semiotics  
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or any other organization  ...  Research has been supported by the US National Science Foundation, Law and Social Sciences Program (SES 0960423) and the Intel Science and Technology Center for Social Computing.  ...  Bitcoin proof of work protocol avoids the need for a secure web of trust, relying instead on the assumption that a majority of the computing power is in the hands of honest participants: ''honest'' here  ... 
doi:10.1080/10350330.2013.777594 fatcat:nelnkm7dvffttjeae2d4pfvtlq

Legal Education in the Blockchain Revolution

Mark Fenwick, Wulf A. Kaal, Erik P. M. Vermeulen
2017 Social Science Research Network  
It proposes eight scenarios for the application of the Blockchain in an education context, based on the current state of technology development and deployment. i  ...  Reproduction and reuse is authorised provided the original source is acknowledged and the original meaning or message of the documents are not distorted.  ...  Acknowledgements This study benefited from the input and collaboration of stakeholders and experts throughout Europe and elsewhere, to whom the project team would like to express its gratitude.  ... 
doi:10.2139/ssrn.2939127 fatcat:7jvxzzixazf77hpevogzuuwtn4
« Previous Showing results 1 — 15 out of 83 results