Filters








143 Hits in 2.7 sec

The Exact Security of PMAC

Peter Gaži, Krzysztof Pietrzak, Michal Rybár
<span title="2017-02-03">2017</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
We observe that the security of PMAC will not increase in general, even if the masks are chosen from a 2-wise independent distribution, and then prove that the security increases to O(q<2/2n), if the τi  ...  We then investigate if the security of PMAC can be further improved by using τi's that are k-wise independent, for k > 1 (the original distribution is only 1-wise independent).  ...  the PRF-security of PMAC with a one-wise independent mask distribution.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2016.i2.145-161">doi:10.46586/tosc.v2016.i2.145-161</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mty7azhebnef5hmdiypxwgysoe">fatcat:mty7azhebnef5hmdiypxwgysoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200725184849/https://tosc.iacr.org/index.php/ToSC/article/download/569/511/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/54/2c/542cca18cc056edb2f5a138db016c17909dc1122.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2016.i2.145-161"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

The Exact Security of PMAC

Peter Gaži, Krzysztof Pietrzak, Michal Rybár
<span title="2017-02-01">2017</span> <i title="International Association for Cryptologic Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
We observe that the security of PMAC will not increase in general, even if the masks are chosen from a 2-wise independent distribution, and then prove that the security increases to O(q<2/2n), if the τi  ...  We then investigate if the security of PMAC can be further improved by using τi's that are k-wise independent, for k > 1 (the original distribution is only 1-wise independent).  ...  the PRF-security of PMAC with a one-wise independent mask distribution.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2016.i2.145-161">doi:10.13154/tosc.v2016.i2.145-161</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tosc/GaziPR16.html">dblp:journals/tosc/GaziPR16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6luafgdcgfc27gjyjsvkohcfja">fatcat:6luafgdcgfc27gjyjsvkohcfja</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211749/https://tosc.iacr.org/index.php/ToSC/article/download/569/511" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/5a/a15a85018b15705fda9bae7074e865fe78e4081b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2016.i2.145-161"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

The Exact Security of PMAC with Two Powering-Up Masks

Yusuke Naito
<span title="2019-06-11">2019</span> <i title="IACR Transactions on Symmetric Cryptology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
Regarding the pseudo-random-function (PRF) security of PMAC, a collision of the hash function, or the difference between a random permutation and a random function offers the lower bound Ω(q2/2n) for q  ...  The tight upper bound of the PRF-security O(q2/2n) of PMAC was given by Gaži et el. (ToSC 2017, Issue 1), but their proof requires a 4-wise independent masking scheme that uses 4 n-bit random values.  ...  Acknowledgments The author would like to thank the reviewers for many helpful comments and suggestions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2019.i2.125-145">doi:10.13154/tosc.v2019.i2.125-145</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tosc/Naito19.html">dblp:journals/tosc/Naito19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bqt6ekiaszc3lawoagamflwhzy">fatcat:bqt6ekiaszc3lawoagamflwhzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211516/https://tosc.iacr.org/index.php/ToSC/article/download/8316/7665" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/8b/f08b63765f354355a3272699e7f6984016bd14a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2019.i2.125-145"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

The Exact Security of PMAC with Two Powering-Up Masks

Yusuke Naito
<span title="2019-06-11">2019</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
Regarding the pseudo-random-function (PRF) security of PMAC, a collision of the hash function, or the difference between a random permutation and a random function offers the lower bound Ω(q2/2n) for q  ...  The tight upper bound of the PRF-security O(q2/2n) of PMAC was given by Gaži et el. (ToSC 2017, Issue 1), but their proof requires a 4-wise independent masking scheme that uses 4 n-bit random values.  ...  Acknowledgments The author would like to thank the reviewers for many helpful comments and suggestions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2019.i2.125-145">doi:10.46586/tosc.v2019.i2.125-145</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4hhg7m3xezbllesmz7el3mmfn4">fatcat:4hhg7m3xezbllesmz7el3mmfn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200711194258/https://tosc.iacr.org/index.php/ToSC/article/download/8316/7665/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ff/1b/ff1bcf1a7b939a39acddd89c85e84dbddc41178f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2019.i2.125-145"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

On Length Independent Security Bounds for the PMAC Family

Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
<span title="2021-06-11">2021</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
Mathematical Cryptology 2008(2)), resolved the long-standing problem of exact security of PMAC. Gaži et al. also showed that the dependency on l can be dropped (i.e.  ...  Third, we analyze the security of PMAC1 (a popular variant of PMAC) with a simple modification in the linear combination of block cipher outputs.  ...  Bishwajit Chakraborty, Soumya Chattopadhyay and Mridul Nandi are supported by the project "Study and Analysis of IoT Security" under Government of India at R.C.Bose Centre for Cryptology and Security,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2021.i2.423-445">doi:10.46586/tosc.v2021.i2.423-445</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nyqqzdaclbbuxpcmperu25fxlm">fatcat:nyqqzdaclbbuxpcmperu25fxlm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210612100659/https://tosc.iacr.org/index.php/ToSC/article/download/8916/8492" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/49/01491a5c79bc42368028f79126d053bf62bb4582.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2021.i2.423-445"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Verifiable audit trails for a versioning file system

Randal Burns, Zachary Peterson, Giuseppe Ateniese, Stephen Bono
<span title="">2005</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lqa4sx5c3rbbbl275ev4o5jf5a" style="color: black;">Proceedings of the 2005 ACM workshop on Storage security and survivability - StorageSS &#39;05</a> </i> &nbsp;
in the presence of lost data.  ...  At a later date, an auditor uses the published data to verify the contents of the file system at any point in time.  ...  Acknowledgments This work was supported by the National Science Foundation (awards CCF-0238305 and IIS-0456027), by the Department of Energy, Office of Science (award DE-FG02-02ER25524), and by the IBM  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1103780.1103787">doi:10.1145/1103780.1103787</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/storagess/BurnsPAB05.html">dblp:conf/storagess/BurnsPAB05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/an367vuubnhz7kpoasp4zbyrrm">fatcat:an367vuubnhz7kpoasp4zbyrrm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080703210908/http://znjp.com/papers/burns-sss05.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/85/6d858522634e65cc588ccc6245cb91c638a2a029.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1103780.1103787"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On the Influence of Message Length in PMAC's Security Bounds [chapter]

Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
By abstracting away details, we are able to show that there are two possibilities: either there are infinitely many instantiations of generic PMAC with security bounds independent of the message length  ...  Despite the initial results on generic PMAC, we show that PMAC with Gray codes is one of the more insecure instantiations of PMAC, by illustrating an attack which roughly establishes a linear dependence  ...  Fellowships from the Institute for the Promotion of Innovation through Science and Technology in Flanders (IWT-Vlaanderen).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49890-3_23">doi:10.1007/978-3-662-49890-3_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ck75ymozwjfznkszklyhx5saqe">fatcat:ck75ymozwjfznkszklyhx5saqe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170716020534/https://eprint.iacr.org/2016/185.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/79/a8796810d874a7086cf0afe57c6500720443b023.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49890-3_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Breaking Symmetric Cryptosystems Using Quantum Period Finding [chapter]

Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
First, we show that the most widely used modes of operation for authentication and authenticated encryption (e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model.  ...  This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it.  ...  This work was supported by the Commission of the European Communities through the Horizon 2020 program under project number 645622 PQCRYPTO.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_8">doi:10.1007/978-3-662-53008-5_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zmmqzo3tn5ggdnuo7axmpc4n2a">fatcat:zmmqzo3tn5ggdnuo7axmpc4n2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710132024/https://www.research.ed.ac.uk/portal/files/31696264/simon_crypto_1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e8/9e/e89e44204439f4f6209adfd4bce5b64e4dd3923e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Breaking Symmetric Cryptosystems using Quantum Period Finding [article]

Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
<span title="2016-06-08">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
First, we show that the most widely used modes of operation for authentication and authenticated encryption e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model.  ...  This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it.  ...  This work was supported by the Commission of the European Communities through the Horizon 2020 program under project number 645622 PQCRYPTO.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1602.05973v3">arXiv:1602.05973v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qmlnmfubvvhhzmsxmsku2qnjke">fatcat:qmlnmfubvvhhzmsxmsku2qnjke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191016050052/https://arxiv.org/pdf/1602.05973v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/da/32/da32802bf626a1cdf8f3600b97bb5886bd414472.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1602.05973v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Building regulatory compliant storage systems

Zachary N. J. Peterson, Randal Burns
<span title="">2006</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4zkn73ej5fgahjoctrxowycw24" style="color: black;">Proceedings of the 2006 national conference on Digital government research - dg.o &#39;06</a> </i> &nbsp;
We then introduce algorithms and an architecture for the secure deletion of individual versions of a file.  ...  Legislators have begun to recognize the importance of how electronically stored data should be maintained and secured.  ...  Finally, ext3cow maps point-in-time requests to the version preceding the exact time of the request.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1146598.1146740">doi:10.1145/1146598.1146740</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/dgo/PetersonB06.html">dblp:conf/dgo/PetersonB06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zidl5ezqdnayva6rwee4ct7bdm">fatcat:zidl5ezqdnayva6rwee4ct7bdm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722024645/http://www.znjp.com/papers/peterson-dissertation.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/01/fe0165a70902fb887e6ae72819cba96826527a4b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1146598.1146740"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Generic Attacks Against Beyond-Birthday-Bound MACs [chapter]

Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
However, this construction has rate 1/2 and later Yasuda himself proposed one of the most popular BBB secure MAC PMAC+ [43] achieving rate 1.  ...  In this work, we study the security of several recent MAC constructions with provable security beyond the birthday bound.  ...  Acknowledgement Mridul Nandi is supported by R.C.Bose Centre for Cryptology and Security. Part of this work was supported by the French DGA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_11">doi:10.1007/978-3-319-96884-1_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w2awuwcdc5g2nmlnxsbecplxay">fatcat:w2awuwcdc5g2nmlnxsbecplxay</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218165151/http://pdfs.semanticscholar.org/1016/61d4bcbca1479ca7fcdc86ba13cd52b77c6d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/16/101661d4bcbca1479ca7fcdc86ba13cd52b77c6d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Integrity Assurance with Minimum Location Disclosure on Mobile Devices by Using Pmac

Mr. P. Senthil, Mrs. S. DurgaDevi, Bhargavi M. B.
<span title="2018-06-30">2018</span> <i title="South Asia Management Association"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oarwpnpqjjfbbkyptszxdp4ch4" style="color: black;">International Journal of Trend in Scientific Research and Development</a> </i> &nbsp;
That is, the granule of the disclosed location is just small enough to prove the user is/has been to a certain place, and the verifier cannot learn anything beyond it.  ...  Security analysis and experimental results show our scheme is both secure and efficient for practical use.  ...  GPS gives the exact location of where we are standing .However in indoor situations GPS may not provide the location quickly.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31142/ijtsrd14567">doi:10.31142/ijtsrd14567</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gdwmehrkqvftjlakqwhzubl6ua">fatcat:gdwmehrkqvftjlakqwhzubl6ua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200318190123/https://www.ijtsrd.com/papers/ijtsrd14567.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/60/ec604b93d84ac5b0d9dd5df8c8aac081e1f8b452.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31142/ijtsrd14567"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Supplemental Material, Protocol_2013_11_07 - A Randomized, Controlled Trial of Lottery-Based Financial Incentives to Increase Physical Activity Among Overweight and Obese Adults

Mitesh S. Patel, Kevin G. Volpp, Roy Rosin, Scarlett L. Bellamy, Dylan S. Small, Jack Heuer, Susan Sproat, Chris Hyson, Nancy Haff, Samantha M. Lee, Lisa Wesby, Karen Hoffer (+7 others)
<span title="2018-05-31">2018</span> <i title="Figshare"> Figshare </i> &nbsp;
Asch in American Journal of Health Promotion  ...  Supplemental Material, Protocol_2013_11_07 for A Randomized, Controlled Trial of Lottery-Based Financial Incentives to Increase Physical Activity Among Overweight and Obese Adults by Mitesh S.  ...  PMACS requires all users of data or applications on PMACS servers to complete a PMACS-hosted cybersecurity awareness course annually, which stresses federal data security policies under data use agreements  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25384/sage.6396581.v1">doi:10.25384/sage.6396581.v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pddk4k55hza3da4flx6ya6ks2m">fatcat:pddk4k55hza3da4flx6ya6ks2m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200303024810/https://s3-eu-west-1.amazonaws.com/pstorage-sage-1076303800/11774990/Protocol_2013_11_07.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/39/84/39842e95793e04ca9f130940da1ff017cb17983d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25384/sage.6396581.v1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Survey on routing in data centers: insights and future directions

Kai Chen, Chengchen Hu, Xin Zhang, Kai Zheng, Yan Chen, Athanasios Vasilakos
<span title="">2011</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dj5kgyxcuzdmhaxvx5dcvfmvce" style="color: black;">IEEE Network</a> </i> &nbsp;
This article conducts a survey on the current state of the art of DCN routing techniques.  ...  Recently, a series of data center network architectures have been proposed. The goal of these works is to interconnect a large number of servers with significant bandwidth requirements.  ...  As mentioned earlier, existing secure data-plane protocols require a source node to know the exact path being used in order to perform monitoring and detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2011.5958002">doi:10.1109/mnet.2011.5958002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/urrohwwrsvecvo2riliqucugr4">fatcat:urrohwwrsvecvo2riliqucugr4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808225737/http://www.cse.ust.hk/~kaichen/papers/ieeenet11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/e5/33e5f4662584697724e00159ac043a80eca32354.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2011.5958002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Loss‐Framed Financial Incentives and Personalized Goal‐Setting to Increase Physical Activity Among Ischemic Heart Disease Patients Using Wearable Devices: The ACTIVE REWARD Randomized Trial

Neel P. Chokshi, Srinath Adusumalli, Dylan S. Small, Alexander Morris, Jordyn Feingold, Yoonhee P. Ha, Marta D. Lynch, Charles A.L. Rareshide, Victoria Hilbert, Mitesh S. Patel
<span title="2018-06-19">2018</span> <i title="Ovid Technologies (Wolters Kluwer Health)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aqdxhm45y5bxvo5crclaeonpdi" style="color: black;">Journal of the American Heart Association : Cardiovascular and Cerebrovascular Disease</a> </i> &nbsp;
All data for this project will be stored on the secure/firewalled servers of the PMACS Data Center, in data files that will be protected by multiple password layers.  ...  All data for this project will be stored on the secure/firewalled servers of the PMACS Data Center, in data files that will be protected by multiple password layers.  ...  The remaining authors have no disclosures to report. Data is presented at the patient-day level. For example, in the control arm there were 55 patients in an 8-week ramp-up period.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1161/jaha.118.009173">doi:10.1161/jaha.118.009173</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/29899015">pmid:29899015</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC6220554/">pmcid:PMC6220554</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lcca4b76r5hnbl4v6lpv2vqdtu">fatcat:lcca4b76r5hnbl4v6lpv2vqdtu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190226205953/http://pdfs.semanticscholar.org/7716/955bf36abe3dc750b1f1a9aac7fc53c39c0f.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/16/7716955bf36abe3dc750b1f1a9aac7fc53c39c0f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1161/jaha.118.009173"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6220554" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 143 results