A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
[chapter]
Lecture Notes in Computer Science
The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. ...
In a TRE-PC scheme, a message is encrypted in such a way that it can only be decrypted at a certain point in time or if the sender releases a piece of trapdoor information known as a pre-open key. ...
The information in this document reflects only the authors' views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
doi:10.1007/978-3-540-75496-1_11
fatcat:uoj6gvegsjhejbj6baui7erlry
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions
[article]
2020
arXiv
pre-print
This paper revisits the secure computation problem using emerging and promising functional encryption techniques and presents a comprehensive study. ...
Most of the existing secure computation solutions rely on garbled-circuits and homomorphic encryption techniques to tackle secure computation issues, including efficiency and security guarantees. ...
Acknowledgment This work was performed while James Joshi was serving as a Program Director at NSF; and the work represents the authors' views and not that of NSF's. ...
arXiv:2011.06191v2
fatcat:t4iamavzovcrzblxtbkqedk4yi
Data Sharing in Cloud Computing Based On Attribute Based Encryption System
2017
International Journal of MC Square Scientific Research
This brings a potential security risk to the user, since CSP may compromise the data for commercial benefits. ...
Ciphertext-policy attribute-based encryption (CP-ABE) has turned to be an important encryption technology to tackle the challenge of secure data sharing. ...
For the security purpose the data owner encrypts the data file and then store in the cloud. The Data owner can have capable of manipulating the encrypted data file. ...
doi:10.20894/ijmsr.117.009.002.007
fatcat:wlueoslglrgm7njjgbhiij6eba
RansomClave: Ransomware Key Management using SGX
[article]
2021
arXiv
pre-print
We use RansomClave to explore the implications of enclave-enhanced ransomware for the key generation, encryption and key release phases of the ransomware lifecycle, and to identify potential limitations ...
We find that some existing mitigations are likely to be effective during the key generation and encryption phases, but that RansomClave enables new trustless key release schemes that could potentially ...
ACKNOWLEDGMENTS This research of Alpesh Bhudia is supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/ ...
arXiv:2107.09470v1
fatcat:muq3z6rfuve4zl6to3sc627rjy
D1.1: COLLABS Innovations for Industrial IoT Systems1
2021
Zenodo
attestation for tackling security issues in IoT systems, implementations of secure multiparty computation (SMC) and homomorphic encryption (HE), platforms providing trusted execution environments (TEEs ...
Section 9 concludes the deliverable with a summary of the impacts of the new SotA on project implementation and the outlook of its contribution. ...
info below) -MCUs with advanced security capabilities, including crypto-engines, ARM with a pre-provisioned solution. ...
doi:10.5281/zenodo.5256842
fatcat:xf4y27mcjvbwvfjxy7lo4kwqw4
OSCAR: Object security architecture for the Internet of Things
2015
Ad hoc networks
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the "state" among communicating entities. ...
We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol. ...
This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic. ...
doi:10.1016/j.adhoc.2014.12.005
fatcat:tknik2yqqfalrfc3sy6qhydzyq
OSCAR: Object Security Architecture for the Internet of Things
[article]
2014
arXiv
pre-print
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the 'state' among communicating entities. ...
We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol. ...
This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic. ...
arXiv:1404.7799v1
fatcat:aegyzacczzbizeuftqsud5wlkq
OSCAR: Object security architecture for the Internet of Things
2014
Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the "state" among communicating entities. ...
We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol. ...
This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic. ...
doi:10.1109/wowmom.2014.6918975
dblp:conf/wowmom/VucinicTRDDG14
fatcat:es46ct6nujd3fna3vzed7xbv4q
Anatomy of a Vulnerable Fitness Tracking System
2018
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies
As a market leader, Fitbit has developed perhaps the most secure wearables architecture that guards communication with end-to-end encryption. ...
We demonstrate that users can tamper with both the app and firmware to selfishly manipulate records or circumvent Fitbit's walled garden business model, making the case for an independent, user-controlled ...
We thank the Fitbit security team for their professional collaboration and acknowledging our work along with their security fixes. ...
doi:10.1145/3191737
fatcat:wzz6zzmrmzcedb4efg52fckrqi
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data
2014
Computer journal
Timed-Release Encryption The concept of Timed-Release Encryption (TRE), i.e. sending a message which can only be decrypted after a pre-defined release time, is attributed to May [9]. ...
Moreover, we propose a security model for Timed-Ephemerizer and formalize relevant security properties. We also propose a new Timed-Ephemerizer protocol and prove its security in the security model. ...
Pre-Open Capability which allows the message sender to assist the receiver to decrypt the ciphertext before the pre-defined disclosure time. ...
doi:10.1093/comjnl/bxu030
fatcat:htptv3webngadmrdrudpipoeyq
AGREE: exploiting energy harvesting to support data-centric access control in WSNs
2013
Ad hoc networks
energy harvesting opportunities to pre-compute and cache suitably chosen CP-ABE-encrypted keys, so as to minimize the need to perform CP-ABE encryptions when no energy from harvesting is available. ...
This work is motivated by a general question: can energy harvesting capabilities embedded in modern sensor nodes be exploited so as to support security mechanisms which otherwise would be too demanding ...
: Integrated appRoach for hOme, mobile and clinical eNvironments) and by the PRIN project TENACE. ...
doi:10.1016/j.adhoc.2013.03.013
fatcat:egsynhqt6ndwxowscynhixzlha
Revisiting Software Protection
[chapter]
2003
Lecture Notes in Computer Science
We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions. ...
Version 1.0 of the TCPA specifications were released early in 2001, defining the core security funcationality of a trusted subsystem for computing platforms, intended to "create a foundation of trust for ...
complexity-theory as a basis for security analysis, definitions of efficiency, and security through obscurity. §5 reviews recent directions in the related area of enhancing platform security with low-cost ...
doi:10.1007/10958513_1
fatcat:5hjupbqp5bgvxdrt2tlkeprr6i
D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version
2021
Zenodo
It describes and demonstrates the various technologies that form the COLLABS Level-3 security package for secure digital supply networks. ...
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4 ...
These models start with pre-trained parameters and are updated over time using the previously monitored traffic. A Pre-processor component first parses the packets and extracts relevant features. ...
doi:10.5281/zenodo.5667012
fatcat:xgzhqfeq6nbwte4h256pntlkau
D3.2 - Annual Releases of the TheFSM Data Platform
2021
Zenodo
for the services of TheFSM backbone infrastructure, we present TheFSM platform's prototype for M12 and additional low-fidelity mock-ups which were designed for all the main functionalities of the data ...
The current document entitled "Annual Release of TheFSM Data Platform" constitutes an accompanied report of TheFSM Platfrom demonstrator providing the preliminary efforts undertaken within the context ...
set of pre-built policies in the platform for fine-grained access. ...
doi:10.5281/zenodo.4593668
fatcat:vesfhc4h4ne7lnagtheotaswka
The Second Named Data Networking Community Meeting (NDNcomm 2015)
2016
Computer communication review
NDN forwarding, routing, and security, and to provide feedback to the NDN architecture design evolution. ...
The meeting provided a platform for the attendees from 49 institutions across 13 countries to exchange their recent NDN research and development results, to debate existing and proposed functionality in ...
We thank the NDNcomm Program Committee members for their effort of putting together an excellent program. We thank all participants for their insights and feedback at the workshop. ...
doi:10.1145/2875951.2875961
fatcat:4wamzw6cazb5jmyrn6abd24ybu
« Previous
Showing results 1 — 15 out of 2,385 results