Filters








6 Hits in 4.6 sec

Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography [article]

Sara Mohamadrezaei, Bahram Sadeghi Bigham
2021 figshare.com  
Then we will discuss about their advantages and disadvantages and we will introduce a new method which it can solve the "chaff and winnowing" method's semantic challenges and make cryptography method safer  ...  Thus we want to introduce a new and secure method in network security. In this article at first we will survey" chaff and winnowing" method and cryptography method.  ...  Conclusion: In this paper we present a new method for enhancing the security for confidentiality and authentication. This approach can solve the semantic problem of chaff and winnowing method.  ... 
doi:10.6084/m9.figshare.14348066.v1 fatcat:rnycurrzmjhq5ok5p4wd545hh4

Solving Semantic Problems in Chaff and Winnowing Problem by Using Cryptography

Bahram Sadeghi Bigham Sara Mohamadrezaei
2020 Zenodo  
UDGs are used for modelling Ad-Hoc networks and finding MDS in such graphs is a promising approach to clustering the wireless Ad-Hoc networks. The MDS problem is proved to be NP-complete.  ...  In this paper, we use Genetic Algorithms to find the Minimum Dominating Set (MDS) of Unit Disk Graphs (UDG).  ...  This approach can solve the semantic problem of chaff and winnowing method. Also the new presented method use the "chaff and winnowing" and "encryption" advantages to enhance the security level.  ... 
doi:10.5281/zenodo.3788102 fatcat:46kxanirafduzptjxwtznefg5y

POTSHARDS—a secure, recoverable, long-term archival storage system

Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti
2009 ACM Transactions on Storage  
Secrecy is achieved by using unconditionally secure secret splitting and spreading the resulting shares across separately managed archives.  ...  Providing availability and data recovery in such a system can be difficult; thus, we use a new technique, approximate pointers, in conjunction with secure distributed RAID techniques to provide availability  ...  ACKNOWLEDGMENTS We would like to thank our colleagues in the Storage Systems Research Center (SSRC) who provided valuable feedback on the ideas in this article.  ... 
doi:10.1145/1534912.1534914 fatcat:jvezhkkqkbeqzo6g27i4kz2xra

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
Widespread deployment of cryptography in the "command and control" of the civilian infrastructure would solve both problems.  ...  This problem appears to have been solved for US government cryptosystems by the 1960s, permitting formerly encrypted messages to be declassified on the basis of content alone.  ...  Notes Chapter 1: Introduction 379 Brooks, Clinton, 78, 83, 205, 231, 348 Brooks, Jack, 346 and in 1940s, 156-158 in 1950s, 159 in 1960s, 159-165 in 1970s and 1980s, 165-167 in 1990s, 169 in American  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Verifying security protocols as planning in logic programming

Luigia Carlucci Aiello, Fabio Massacci
2001 ACM Transactions on Computational Logic  
In AL SP we can give a declarative specification of a protocol with the natural semantics of send and receive actions which can be performed in parallel.  ...  AL SP is based on logic programming with negation as failure, and with stable model semantics.  ...  Baumgartner and U. Furbach for many useful comments on an earlier formalization of this work, I. Niemel ä and T. Syrj änen for support  ... 
doi:10.1145/383779.383785 fatcat:hdkoyg3mhbbbpdkqyshkn3wjsq

Enhancing user privacy in web services

Jean-Sébastien Légaré
2018
The full abstract for this thesis is available in the body of the thesis, and will be available when the embargo expires.  ...  While a human may be able to inspect all of the keys for a given identity in the PGP database and winnow the legitimate keys from the chaff, properly identifying legitimate keys programmatically in an  ...  Some use it to solve a form of data lock-in [15, 128] , by empowering users to place data in personal stores in the cloud.  ... 
doi:10.14288/1.0358013 fatcat:egmn42i4lrgghnjjvy5yya7egu