Filters








43,674 Hits in 4.6 sec

Secure Network Coding over the Integers [chapter]

Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2010 Lecture Notes in Computer Science  
Underlying our techniques is a modified approach to random linear network coding where instead of working in a vector space over a field, we work in a module over the integers (with small coefficients)  ...  Network coding offers the potential to increase throughput and improve robustness without any centralized control.  ...  the US Government, the UK Ministry of Defence, or the UK Government.  ... 
doi:10.1007/978-3-642-13013-7_9 fatcat:73xi2aa5zfcovd442ecxu2j7sm

Performance Evaluation of Secure Network Coding Using Homomorphic Signature

Seung-Hoon Lee, Mario Gerla, Hugo Krawczyk, Kang-Won Lee, Elizabeth A. Quaglia
2011 2011 International Symposium on Networking Coding  
Using this simulator, we have evaluated the performance of secure network coding under various network conditions and have compared it with other secure network coding schemes.  ...  In order to prevent malicious attacks, we have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems.  ...  The signature of w is computed as: Fig. 3 . 3 Processing Delay: Network Coding over the Integers starts encode() operation to generate a new coded block.  ... 
doi:10.1109/isnetcod.2011.5978945 fatcat:fgvblcrjcrapzjwqmym626f4vm

Efficient Network Coding Signatures in the Standard Model [chapter]

Dario Catalano, Dario Fiore, Bogdan Warinschi
2012 Lecture Notes in Computer Science  
Network Coding is a routing technique where each node may actively modify the received packets before transmitting them.  ...  In this paper we introduce two new network coding signature schemes.  ...  The work described in this paper has been supported in part by the European Commission through the ICT programme under contract ICT-2007-216676 ECRYPT II.  ... 
doi:10.1007/978-3-642-30057-8_40 fatcat:ky5cl7u7izc5vhgnvnhxpvhc5i

Attacks on Network Infrastructure

Danai Chasaki, Qiang Wu, Tilman Wolf
2011 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)  
Index Terms-network security, network attack, programmable router, network processor, processing monitor • To our knowledge, the first practical example of a novel type of attack on routers with programmable  ...  We show that vulnerable packet processing code can be exploited on a Click modular router as well as on a custom packet processor on the NetFPGA platform.  ...  ACKNOWLEDGEMENTS This material is based upon work supported by the National Science Foundation under Grant No. 0952524.  ... 
doi:10.1109/icccn.2011.6005919 dblp:conf/icccn/ChasakiWW11 fatcat:f5b7g2tvpbelze67ovgb4tlxem

CrypTFlow: Secure TensorFlow Inference [article]

Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2020 arXiv   pre-print
We experimentally demonstrate the power of our system by showing the secure inference of real-world neural networks such as ResNet50 and DenseNet121 over the ImageNet dataset with running times of about  ...  Prior work in the area of secure inference has been limited to semi-honest security of small networks over tiny datasets such as MNIST or CIFAR. Even on MNIST/CIFAR, CrypTFlow outperforms prior work.  ...  Prior work in the area of secure inference has been limited to small networks over tiny datasets such as MNIST or CIFAR.  ... 
arXiv:1909.07814v2 fatcat:e776uzl6crgv3mibgykniljweu

Secure Medical Image Analysis with CrypTFlow [article]

Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare
2020 arXiv   pre-print
We empirically demonstrate the power of our system by showing the secure inference of real-world neural networks such as DENSENET121 for detection of lung diseases from chest X-ray images and 3D-UNet for  ...  We present CRYPTFLOW, a system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build two components.  ...  CRYPTFLOW provides the first implementation and evaluation of a system for secure segmentation.  ... 
arXiv:2012.05064v1 fatcat:naymjmjxwzcb3b35mq23v7bxkm

Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys [article]

Debaditya Chaudhuri, Michael Langberg, Michelle Effros
2019 arXiv   pre-print
the (non-secure) capacity of multiple-unicast network coding instances — a well known open problem.  ...  It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to z network links, to assume that the source node is the only node that generates random  ...  Given integers R and z, we define a secure network code over the network G to be (R, z)-feasible if it allows information to be communicated from the source S to the terminal T at rate R and, in addition  ... 
arXiv:1907.03522v1 fatcat:vutvsu77fnhv7cwruermuav6qm

Unifying notions of generalized weights for universal security on wire-tap networks

Umberto Martinez-Penas, Ryutaroh Matsumoto
2016 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
Universal security over a network with linear network coding has been intensively studied.  ...  However, previous linear codes used for this purpose were linear over a larger field than that used on the network.  ...  Acknowledgement The authors gratefully acknowledge the support from The Danish Council for Independent Research (Grant No. DFF-4002-00367) and from the JSPS (Grant No. 26289116).  ... 
doi:10.1109/allerton.2016.7852315 dblp:conf/allerton/Martinez-PenasM16 fatcat:mbjnsskeu5f3fib4ickzs2gqmi

Fault-tolerant and secure distributed data storage using random linear network coding

Pouya Ostovari, Jie Wu
2016 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)  
Network coding is a technique which can be used in wired and wireless networks to increase the throughput of the networks and provide reliable transmissions.  ...  Using network coding, the set of packets that form a file can be encoded to infinite number of packets, and a subset of these coded packets is sufficient to retrieve the original data.  ...  The coefficients in random linear network coding are chosen randomly over a finite field (Galois field). Also, the linear operations are performed over a finite field.  ... 
doi:10.1109/wiopt.2016.7492920 dblp:conf/wiopt/Ostovari016 fatcat:3orurdl3brbgnmxvnagcje72li

Efficient Secured Lossless Coding Of Medical Images– Using Modified Runlength Coding For Character Representation

S. Annadurai, P. Geetha
2007 Zenodo  
The proposed modified runlength coding greatly improves the compression performance and also increases the security level.  ...  The use of the lifting scheme allows generating truly lossless integer-to-integer wavelet transforms. Images are compressed/decompressed by well-known EZW algorithm.  ...  unsuitable for interactive applications like telematics over large networks.  ... 
doi:10.5281/zenodo.1073264 fatcat:i2yapvly6bd4hdt2ntbzhuyuly

Application of deep neural networks for security analysis of digital infrastructure components

Alexander Pechenkin, Roman Demidov, A. Sarygulov, V. Sergeev, L. Ungvári, W. Semmler
2018 SHS Web of Conferences  
The approach is based on building semantically significant vector representations of software code and multistage instructing the deep neural network on revealing hierarchical abstractions in computer  ...  The authors describe specific features of the goal of analyzing software code for presence of vulnerabilities and proceeding thereof it is offered to use a neural network with long short-term memory (LSTM  ...  A task being solved by neural network consisted in searching the integer overflow in machine code of different length.  ... 
doi:10.1051/shsconf/20184400068 fatcat:5bfeqoudv5bfrh7njyffinhoiy

Towards security defect prediction with AI [article]

Carson D. Sestili and William S. Snavely and Nathan M. VanHoudnos
2018 arXiv   pre-print
We found that the state of the art AI system, a memory network modeled after Choi et al. [1], can achieve similar performance to the static analysis engines, but requires an exhaustive amount of training  ...  To do so, we developed a code generator, s-bAbI, capable of producing an arbitrarily large number of code samples of controlled complexity.  ...  INTRODUCTION Predicting security defects in source code is of significant national security interest.  ... 
arXiv:1808.09897v2 fatcat:7w32qpkuqrarzneazt2h3tuwpm

Relative Generalized Matrix Weights of Matrix Codes for Universal Security on Wire-Tap Networks

Umberto Martinez-Penas, Ryutaroh Matsumoto
2018 IEEE Transactions on Information Theory  
Universal security over a network with linear network coding has been intensively studied.  ...  However, previous linear codes and code pairs used for this purpose were linear over a larger field than that used on the network, which restricts the possible packet lengths of optimal universal secure  ...  The first author is also thankful for the support and guidance of his advisors Olav Geil and Diego Ruano. At the time of submission, the first author was visiting the Edward S. Rogers Sr.  ... 
doi:10.1109/tit.2017.2766292 fatcat:gwr4aho5hrfpditli4shuulxae

Attacks and Defenses in the Data Plane of Networks

Danai Chasaki, Tilman Wolf
2012 IEEE Transactions on Dependable and Secure Computing  
Security issues in computer networks have focused on attacks on end-systems and the control plane. An entirely new class of emerging network attacks aims at the data plane of the network.  ...  Index Terms-network security, network attack, programmable router, network processor, processing monitor, embedded system security.  ...  The processing of this packet turns the 'good' code/protocol routine that runs on the network processor into 'bad' code.  ... 
doi:10.1109/tdsc.2012.50 fatcat:yum5qyigl5ehzbvdgbyzjz757q

Secure Communication with Network Coding

Zhanghua Cao, Yuansheng Tang, Jinquan Luo
2012 Physics Procedia  
In this paper, we consider the problem of secure communication over wiretap multicast networks.  ...  The problem of secure communication based on network coding over a wiretap network was first explored by Cai and Yeung in [2], then they further developed their method in paper [9].  ...  Next, we proceed to proving that we can construct appropriate linear network codes to achieve secure communication. Firstly, we need a couple of useful lemmas.  ... 
doi:10.1016/j.phpro.2012.02.286 fatcat:fhp4d4yv4ja65bvczl4mof3ueq
« Previous Showing results 1 — 15 out of 43,674 results