804,710 Hits in 6.0 sec

Rate-limited secure function evaluation

Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2016 Theoretical Computer Science  
We introduce the notion of rate-limited secure function evaluation (RL-SFE).  ...  Loosely speaking, in an RL-SFE protocol participants can monitor and limit the number of distinct inputs (i.e., rate) used by their counterparts in multiple executions of an SFE, in a private and verifiable  ...  Rate-Limited SFE In this section, we introduce three notions for rate-limited secure function evaluation (RL-SFE).  ... 
doi:10.1016/j.tcs.2016.09.020 fatcat:xapggttweze7jae3fq7muxo7ju

Rate-Limited Secure Function Evaluation: Definitions and Constructions [chapter]

Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2013 Lecture Notes in Computer Science  
We introduce the notion of rate-limited secure function evaluation (RL-SFE).  ...  As a case study, we take a closer look at the oblivious polynomial evaluation (OPE) protocol of Hazay and Lindell, show that it is commit-first and instantiate efficient rate-limited variants of it.  ...  Rate-Limited Secure Function Evaluation In this section, we introduce three notions for rate-limited secure function evaluation (RL-SFE).  ... 
doi:10.1007/978-3-642-36362-7_28 fatcat:j7fnfla2yvedllcox5isnqg3we

Assessing security properties of software components: a software engineer's perspective

K.M. Khan, J. Han
2006 Australian Software Engineering Conference (ASWEC'06)  
The proposed scheme consists of three stages: (i) a system-specific security requirement specification of the enclosing application; (ii) a component-specific security rating; and (iii) an evaluation method  ...  The scheme is partially based on ISO/IEC 15408, the Common Criteria for Information Technology Security Evaluation (CC) and the Multi-Element Component Comparison and Analysis (MECCA) model.  ...  ) (rate) Authorized licensed use limited to: SWINBURNE UNIV OF TECHNOLOGY.  ... 
doi:10.1109/aswec.2006.13 dblp:conf/aswec/KhanH06 fatcat:7ircygs6wbeutgbluaiemafyzu

A Common Criteria framework for the evaluation of Information Technology systems security [chapter]

R. Kruger, J. H. P. Eloff
1997 Information Security in Research and Business  
In this paper is expanded a process of evaluation by means of which to determine the functional security requirements of an Information Technology (IT) system.  ...  The said process of evaluation has been developed on the bases of two sources currently used to determine the functional security requirements obtaining to an IT system; the first being the new foundation  ...  The new foundation provides a limited list of high-level functions needed for the TOE under evaluation.  ... 
doi:10.1007/978-0-387-35259-6_16 fatcat:cithcby77vapfgwv3e7cocuix4

Classification of Static Security Status Using Multi-Class Support Vector Machines

S Kalyani, KS Swarup
2012 The Journal of Engineering Research  
The SVM classifier was found to give high classification accuracy and a smaller misclassification rate compared to the other classifier techniques.  ...  The multi-class SVM classifier design is based on the calculation of a numeric index called the static security index.  ...  In power system security evaluation, it is important to ensure that the misclassification rate is kept at minimal.  ... 
doi:10.24200/tjer.vol9iss1pp21-30 fatcat:vb7ppjbt35cengs2j4gwrnea7a

Computer Security Subsystem Interpretation of The Trusted Computer System Evaluation Criteria [chapter]

1985 The 'Orange Book' Series  
Subsystems that are evaluated for two or more of these functions will receive a separate evaluation rating for each function evaluated.  ...  Subsystems that are evaluated for more than one function will receive a separate INTRODUCTION rating for each function evaluated.  ...  functions.  ... 
doi:10.1007/978-1-349-12020-8_11 fatcat:ltkvdwhomzhjpmijze452hbcny

Diffusion‐controlled reactions: Upper bounds on the effective rate constant

J. Blawzdziewicz, G. Szamel, H. Van Beijeren
1991 Journal of Chemical Physics  
The bounds have been explicitly evaluated, in the latter case using the distribution corresponding to the hard-sphere equilibrium ensemble.  ...  For a diffusion-controlled reaction in a static, reactive bed of nonoverlapping spherical traps, upper bounds on the effective reaction-rate constant have been obtained from a variational principle of  ...  .* In this note, we address the problem of evaluating the steady-state effective reaction-rate constant for a reactive bed of static traps.  ... 
doi:10.1063/1.460131 fatcat:37dnz5qjzvclnirirfunh7y3s4

Quality of Physical Activity Apps: Systematic Search in App Stores and Content Analysis (Preprint)

Sarah Paganini, Yannik Terhorst, Lasse Bosse Sander, Selma Catic, Sümeyye Balci, Ann-Marie Küchler, Dana Schultchen, Katrin Plaumann, Sarah Sturmbauer, Lena Violetta Krämer, Jiaxi Lin, Ramona Wurst (+3 others)
2020 JMIR mHealth and uHealth  
Further, app characteristics, content and functions, and privacy and security measures were assessed. The correlation between user star ratings and MARS was calculated.  ...  Given the present privacy, security, and evidence concerns inherent to most rated apps, their medical use is questionable.  ...  Thus, recommendations for the use of physical activity apps can only be given with major limitations. The contents and functions correlated positively with quality ratings.  ... 
doi:10.2196/22587 pmid:34106073 fatcat:p4w34gllufhyzl6si5isuusyby

New Classifier Design for Static Security Evaluation Using Artificial In-telligence Techniques

Ibrahim Saeh, Wazir Mustafa, Nasir Al-geelani
2016 International Journal of Electrical and Computer Engineering (IJECE)  
This paper proposes evaluation and classification classifier for static security evaluation (SSE) and classifica-tion.  ...  Empirically, with the present of FSA, the implementation results indicate that these classifiers have the capability for system security evaluation and classification.  ...  Static Security Evaluation Indices Selection Power system networks are required to operate with security limits.  ... 
doi:10.11591/ijece.v6i2.9572 fatcat:27edcc2wbfcqrhpbvr2uvzhklm

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON [chapter]

Kenji Yamamoto, Toshihiro Yamauchi
2010 Communications in Computer and Information Science  
the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes.  ...  However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear.  ...  Security focused OS Evaluation of secure OS Secure OS indicates OS that has the function to achieve MAC and the minimum privilege.  ... 
doi:10.1007/978-3-642-17610-4_7 fatcat:q3skjr7geredjeu27boyrsicg4

Making Sense of Smart Card Security Certifications [chapter]

Jason Reid, Mark Looi
2000 Smart Card Research and Advanced Applications  
Because the security target effectively defines the scope of the evaluation, it is potentially dangerous to automatically equate a high assurance rating with high levels security functionality in a particular  ...  But there is another critical aspect to the strength of mechanisms rating that is concerned with overall effectiveness of the security functions.  ... 
doi:10.1007/978-0-387-35528-3_13 fatcat:zwlh4w6iivgzvosjhw5ling4m4

Risk-based security assessment of power system voltage drop: a case study of Nigerian 330KV 41-bus transmission grid

U. N. Asibeluo, T. C. Madueme
2018 Nigerian Journal of Technology  
It requires the probability of voltage distribution, the probability of contingency and severity function to evaluate the impact of the contingency.  ...  Thus, this paper addresses the problem of power system security using the risk-based security assessment.  ...  It evaluates to 1.0 for each bus at the deterministic limits (0.95 p.u.) and increases linearly as voltage magnitude fall below limits as illustrated in Figure Risk Evaluation In order to evaluate  ... 
doi:10.4314/njt.v37i3.24 fatcat:qqy7y6oo5jgutiew5deq6pmie4

Medicolegal considerations on the concept of inability according to the law no 222/84 (INPS) and the law no 118/71 (Civil Invalidity): similarities, differences and operational practices in the medicolegal evaluation of oncological diseases

Michele Sammicheli
2016 Prevention & Research  
Results: in the 10 cases, all recognized as "total and permanent inability to work 100%" in Civil Invalidity, only the 50% were evaluated as "unable to perform any work" according to the law 222/84.  ...  the law 222/1984, on which the INPS (Italian National Welfare Institute) social security concept is based and which sets the unfit-to-work person as the one who "is in the total and permanent inability  ...  The evaluative approach in the Social Security law (222/1984) is different; in this medico-legal scope, there are no percentage rate established by law and the evaluation is left only to the judgement  ... 
doi:10.11138/per/2016.5.4.140 fatcat:yq6vq6tl3fdf3awft2xkivsyny

Static Security Evaluation in Power Systems usingMulti-Class SVM with Different Parameter SelectionMethods

S. Kalyani, K. S. Swarup
2011 International Journal of Machine Learning and Computing  
Security evaluation is a major concern in real time operation of electric power systems.  ...  Traditional method of security evaluation performed by continuous load flow analysis involves long computer time and generates voluminous results.  ...  This paper addresses security evaluation as a pattern classification problem with the classifier function designed by Support Vector Machine (SVM).  ... 
doi:10.7763/ijmlc.2011.v1.28 fatcat:meek5wvxdndkzdgavbmfir25ou

Building Secure SRAM PUF Key Generators on Resource Constrained Devices [article]

Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, Damith C. Ranasinghe
2019 arXiv   pre-print
We present a methodology for constructing a lightweight and secure PUF key generator for resource limited devices.  ...  Silicon physical unclonable functions (PUFs) offering unique device specific secrets to electronic commodities are a low-cost alternative to secure NVM.  ...  We will focus on the correct recovery in the context of resource limited devices and a RFE where the Gen() function is implemented on the resource limited token in Section III and IV.  ... 
arXiv:1902.03031v1 fatcat:5oxvoi4qindbxj2bsm5s74s6fi
« Previous Showing results 1 — 15 out of 804,710 results