6,203 Hits in 4.3 sec

On the Significance of Quiescent Protocols for Asynchronous Perfectly Secure Message Transmission [article]

Anupriya Inumella
2019 arXiv   pre-print
We consider the problem of perfect (information-theoretically) secure message transmission (PSMT) from a sender S to a receiver R in asynchronous directed networks tolerating dual adversary.  ...  We achieve PSMT in this setting with a new class of message transmission protocols called the quiescent protocols.  ...  A protocol Π is said to facilitate quiescent asynchronous perfectly secure message transmission (PSMT) between S and R if for any message m drawn from F and for every adversary A static t , the following  ... 
arXiv:1805.06227v2 fatcat:yayb3oq3hbg3vdbfnv7mmbmp5a

ShareTrace: Contact Tracing with Asynchronous, Parallel Message Passing on a Temporal Graph [article]

Ryan Tatton, Erman Ayday, Youngjin Yoo, Anisa Halimi
2022 arXiv   pre-print
In this work, we aim to provide an efficient and scalable formulation of ShareTrace by utilizing asynchronous, parallel, non-iterative message passing on a temporal graph.  ...  ShareTrace is one such approach that has been shown to provide improved efficacy in tracking the spread of disease by also considering (in)direct forms of contact.  ...  of a temporal graph that does not require such assumptions to infer the transmission of disease.  ... 
arXiv:2203.12445v2 fatcat:whtdgg3yxvfonfg7blatyih2wi

Asynchronous Secure Communication Tolerating Mixed Adversaries [chapter]

K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan
2002 Lecture Notes in Computer Science  
We study the problem of secure communication tolerating generalized mixed adversaries across an underlying completely asynchronous incomplete network.  ...  (with negligible error) security.  ...  Definition 4 (Secure Message Transmission).  ... 
doi:10.1007/3-540-36178-2_14 fatcat:muk6nvonpjfnzjterlycq3jj34

A Design of Linear Task Set Model for Multimedia Services in IP Network

Hyoungjin Kim, Jaekon Oh, Gyusu Jung
2014 International Journal of Multimedia and Ubiquitous Engineering  
To secure independence and simplicity among components, the study defines a port channel object of a singleton structure and realizes design that can allow stream transmission and overall stream monitoring  ...  Based on the simple, basic structure grounded on LTS structure, the study defines a consistent process and allows free structure alteration in the simple system structure according to the service purpose  ...  Message Block Transmission Flow LTS should keep consistency of transmission method, processing data transmission between tasks asynchronously in order to process data securing independence between tasks  ... 
doi:10.14257/ijmue.2014.9.1.09 fatcat:4mjpg367vranblourirn44cbae

Asynchronous reference frame agreement in a quantum network

Tanvirul Islam, Stephanie Wehner
2016 New Journal of Physics  
In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty  ...  Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks.  ...  convince oneself that G is a directed acyclic graph because any cycle in the graph would violate the cause and effect relation of the edge directions.  ... 
doi:10.1088/1367-2630/18/3/033018 fatcat:ruvdnkpjjrdnnixtdwysmzjzge

Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board

Jaap-Henk Hoepman
2015 Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society - WPES '15  
In these applications our protocol protects the so-called social graph. 1 2 See  ...  We implement a secure and privacy friendly asynchronous unidirectional message transmission protocol using a public bulletin board that makes individual send or receive events unlinkable to one another  ...  DEFINING THE PROTOCOL An asynchronous unidirectional private point-to-point message transmission protocol allows one user to send messages asynchronously to another user in private.  ... 
doi:10.1145/2808138.2808142 dblp:conf/wpes/Hoepman15 fatcat:4vx6tthmejfbhdy3vkv3ij2kdq

Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service

Hyeong Jo, Tae Son, Seol Jeong, Soon Kang
2016 ISPRS International Journal of Geo-Information  
In this paper, we propose a physical distance-based asynchronous messaging platform that specializes in processing personalized data and location-based messages.  ...  The proposed system disperses traffic using a location-based message-delivery protocol, and has high stability.  ...  The direct communication buffer in a FE Conclusions In this paper, we introduced the LIoT service and investigated a proximity-based asynchronous messaging platform specialized in processing personalized  ... 
doi:10.3390/ijgi5070116 fatcat:rj7r7qohqra6xnmgpmqbhwahja

Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks

Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Suijian Zhou, Remzi Seker, Jiang Bian
2014 Journal of Cyber Security and Mobility  
in order to understand how well a general data-parallel system can run graph problems.  ...  In this work, we conducted a comparison study on parallel processing systems for large-scale graph computations in a systematic manner, aiming to reveal the characteristics of those systems in performing  ...  Acknowledgment This work was supported in part by the National Science Foundation under Grant CRI CNS-0855248, Grant EPS-0701890, Grant EPS-0918970, and Grant MRI CNS-0619069.  ... 
doi:10.13052/jcsm2245-1439.333 fatcat:r2xiozmuvvaz7o2gpbfqhu4mye

ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services

Ragnar Mikael Halldorsson, Edlira Dushku, Nicola Dragoni
2021 IEEE Access  
In the IoT domain, RA research is currently following two main directions: Dynamic RA and Swarm RA.  ...  However, existing RA protocols do not perform dynamic attestation in asynchronous IoT networks.  ...  Using this, V RF can construct a Directed Acyclic Graph (DAG) that represents the order of service invocation.  ... 
doi:10.1109/access.2021.3122391 fatcat:pznlqkmsgvedllk6iah32semte

Eavesdropping games: a graph-theoretic approach to privacy in distributed systems

Matthew Franklin, Zvi Galil, Moti Yung
2000 Journal of the ACM  
We initiate a graph-theoretic approach to study the (information-theoretic) maintenance of privacy in distributed environments in the presence of a bounded number of mobile eavesdroppers ("bugs").  ...  For two fundamental privacy problemssecure message transmission and distributed database maintenancewe assume an adversary is "playing eavesdropping games, " coordinating the movement of the bugs among  ...  We also thank Christine Chang and Joan Feigenbaum for discussions about asynchronous models of eavesdropping games.  ... 
doi:10.1145/333979.333980 fatcat:dyis2a2wejd3xkeuufpadsxatq

treNch: Ultra-Low Power Wireless Communication Protocol for IoT and Energy Harvesting

Fernando Moreno-Cruz, Víctor Toral-López, Antonio Escobar-Molero, Víctor U. Ruíz, Almudena Rivadeneyra, Diego P. Morales
2020 Sensors  
Together with the energy-management algorithm, it operates with asynchronous transmissions, synchronous and optional receptions, short frame sizes and a light architecture that gives control to the nodes  ...  Moreover, we propose some security optimizations, such as shorter over-the-air counters, to reduce the packet overhead without decreasing the security level.  ...  A message from a node is by default directed to the client and vice versa (only network configuration messages stay in the gateways).  ... 
doi:10.3390/s20216156 pmid:33138001 pmcid:PMC7684469 fatcat:r26yibenhvf2bntbxxiaey5gxa

M-DART based Asynchronous File Sharing Scheme in VANET

Prabhsharan Kaur, Rasmeet S. Bali, Arvinder Kaur
2015 Procedia Computer Science  
Information sharing among vehicles can be considered as one of the most popular medium for exchanging safety and entertainment messages between mobile users.  ...  By using Multi-path Dynamic Address Routing the algorithm utilizes the best available path until it fails to switch to the next best available route in the network.  ...  There are three cases considered for dissemination mechanism in which mobility of vehicles in the opposite direction, same direction or in both the directions.  ... 
doi:10.1016/j.procs.2015.07.487 fatcat:yntlxe7ambaz7aazllrlvtjgye

Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing [chapter]

Gencer Erdogan, Ketil Stølen
2017 Lecture Notes in Computer Science  
In this paper, we present CORAL and then discuss why the language is designed the way it is, and what we could have done differently.  ...  We have developed a domain-specific modeling language named CORAL that employs risk assessment to help security testers select and design test cases based on the available risk picture.  ...  to the message direction.  ... 
doi:10.1007/978-3-319-57858-3_8 fatcat:4omizw62tfe3fnyxucyjcmzchu

Performance Evaluation of RPL Routes and DODAG Construction for IoTs

Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim
2021 International Journal for Digital Society (IJDS)  
Protocol for Low-Power and Lossy Networks (RPL), therein the RPL nodes have organized topology as a Directed Acyclic Graph (DAG) and terminated at one root to form the Destination Oriented DAGs (DODAGs  ...  The simulation results show that the RPL control messages flow in consistent manner, the DODAG root able to connect to all of the neighbor motes, also Rank illustration shows no loops and DODAG topology  ...  RPL organizes a topology as a Directed Acyclic Graph (DAG) a directed graph having the property all edges are contained in paths oriented toward and terminating at one or more root nodes, that is partitioned  ... 
doi:10.20533/ijds.2040.2570.2021.0207 fatcat:na5z2gkj2ngexdugpbu46fq6ty

Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission

Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2013 Theoretical Computer Science  
For unconditionally reliable message transmission (URMT) in synchronous directed networks of n nodes, a subset of which may be Byzantine faulty, it is well-known that the minimum connectivity requirements  ...  In this work, we study the minimum connectivity requirements for the existence of (a) Las Vegas protocols in synchronous networks, (b) asynchronous Monte Carlo protocols and (c) asynchronous Las Vegas  ...  We assume the secure channels setting, i.e., all the edges are secure, reliable and authenticated.  ... 
doi:10.1016/j.tcs.2012.12.004 fatcat:ectb4el4jbgnhi3hasmptjd2ye
« Previous Showing results 1 — 15 out of 6,203 results