Filters








402 Hits in 6.1 sec

The Last Mile: High-Assurance and High-Speed Cryptographic Implementations [article]

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub
2019 arXiv   pre-print
Our approach goes the last mile and delivers assembly code that is provably functionally correct, protected against side-channels, and as efficient as hand-written assembly.  ...  We develop a new approach for building cryptographic implementations.  ...  In this paper we go the last mile: we develop a practical framework that can be used by cryptographic engineers to build high-assurance and high-speed implementations that are as fast or even faster than  ... 
arXiv:1904.04606v1 fatcat:6faifycmbrcfjaaudfj2wo3pp4

The Last Mile: DSCSA Solution Through Blockchain Technology: Drug Tracking, Tracing, and Verification at the Last Mile of the Pharmaceutical Supply Chain with BRUINchain

William Chien, Josenor De Jesus, Ben Taylor, Victor Dods, Leo Alekseyev, Diane Shoda, Perry B. Shieh
2020 Blockchain in Healthcare Today  
suspect and illegitimate products at the last mile: pharmacist to patient, the most complex area of the drug supply chain.  ...  much more depending on regulatory interpretation and speed of verification.  ...  Rosner (PhD) and the Operations Team, specifically Steve Van Nuffel, Derry Manley, Lindy Blom, and Donncha Phelan.  ... 
doi:10.30953/bhty.v3.134 fatcat:eq4tdi6cpff2zp2rov6t3la2vi

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects [article]

Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Danfeng Yao, Murat Kantarcioglu
2019 arXiv   pre-print
We are in the process of integrating CryptoGuard with the Software Assurance Marketplace (SWAMP).  ...  Running our tool, CrytoGuard, on 46 high-impact large-scale Apache projects and 6,181 Android apps generate many security insights.  ...  This approach effectively skips the bulk of the functional code and substantially speeds up the analysis.  ... 
arXiv:1806.06881v5 fatcat:mg5brtvyqff6hbymzslx537dea

Cryptographic Key Management Concepts [chapter]

Ralph Spencer Poore
2007 Information Security Management Handbook, Sixth Edition  
However, until the last two decades, it held little practical interest for business.  ...  By finding each letter of plaintext in the first alphabet and substituting the letter from the second alphabet, a ciphertext is generated.  ...  Understanding cryptographic key management and cryptographic implementations permits the secure management of the information assets of enterprises. Previous screen  ... 
doi:10.1201/9781439833032.ch83 fatcat:b6yf26eoznhn5evox5wkskqyw4

On Wide Area Network Optimization

Yan Zhang, Nirwan Ansari, Mingquan Wu, Heather Yu
2012 IEEE Communications Surveys and Tutorials  
latency and high packet loss rate.  ...  the impact of latency and loss, and minimize bandwidth consumption.  ...  High-speed TCP [111] modifies the congestion control mechanism with large congestion windows, and hence, High-speed TCP window will grow faster than standard TCP and also recover from losses more quickly  ... 
doi:10.1109/surv.2011.092311.00071 fatcat:c7ipc7ekivh7zhk4yt3bakcfm4

Security of Wireless Communication [chapter]

Dan Cvrček
2009 IFIP Advances in Information and Communication Technology  
The second part of the paper details particular attacks that work against current implementations of wireless sensor networks and routing, traffic analysis, and cryptography in particular.  ...  Can we appreciate the difference between wire and wireless communication and also the difference between centralised wireless networks, e.g., WiFi and largely decentralised sensor networks?  ...  There are two cryptographic algorithms -A3 and A5 -providing cryptographic assurance that no unauthorised person can eavesdrop on calls or masquerade and initiate or accept calls on someone else's behalf  ... 
doi:10.1007/978-3-642-03315-5_9 fatcat:26fntrqq5bfqjjugauogi4rf3q

A Distributed `Black Box' Audit Trail Design Specification for Connected and Automated Vehicle Data and Software Assurance [article]

Gregory Falco, Joshua E. Siegel
2020 arXiv   pre-print
efficiency for automotive and other high-assurance systems.  ...  The proposed black box architecture is both layered and diffuse, employing distributed hash tables (DHT), a parity system and a public blockchain to provide high resilience, assurance, scalability, and  ...  Implemented properly, it has the potential to enable high-assurance systems and improve auditability for OEMs, suppliers, vehicle operators, and other stakeholders and drive the safe, large-scale adoption  ... 
arXiv:2002.02780v2 fatcat:xp4hk4abqjbqjfo3tgfgfflgzi

Evaluate Signals Transmission over Internet Protocol Networks

Issa Obaid ALorf
2014 IOSR Journal of Electrical and Electronics Engineering  
The last decade has seen an explosion in the use of the Internet.  ...  The difference arises from the different method of implementation of the transmission.  ...  However, thelast mile' of the Internet is almost invariably the PSTNthe Public Switched Telephone Network.  ... 
doi:10.9790/1676-09265065 fatcat:j3c7xoqzq5hb7poeetji352jt4

Secure cognitive mobile hotspot

Zaheer Ahmed, Habibullah Jamal, Rizwana Mehboob, Shoab Khan, Muhammad Shahbaz
2010 IEEE transactions on consumer electronics  
The cognitive controller in the device seamlessly switches the WAN interfaces to provide optimum connectivity and Quality of Service parameters to the LAN devices and VHF/UHF radio links.  ...  The mobile hotspot acts as a gateway and integrates VHF/UHF radios with multiple wireless WAN and LAN technologies.  ...  With the unprecedented and accelerated growth in IT applications, the demand for high speed WAN links increased manifolds thus necessitating the growth in broadband technologies.  ... 
doi:10.1109/tce.2010.5505977 fatcat:63ejnpfe5jelfjlqimy3yhcvke

GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications

Xiaodong Lin, Xiaoting Sun, Pin-Han Ho, Xuemin Shen
2007 IEEE Transactions on Vehicular Technology  
We demonstrate that the proposed protocol can not only guarantee the requirements of security and privacy, but also provide desired traceability of each vehicle in the case where the identity of the message  ...  Extensive simulation is conducted to verify the efficiency, effectiveness and applicability of the proposed protocol in various application scenarios under different road systems.  ...  However, the speed of implementing a cryptographic algorithm is highly determined by the adopted hardware facility.  ... 
doi:10.1109/tvt.2007.906878 fatcat:wntxvcavyrcm5fbiawmrqbnrbq

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hardcoded by vendors, inducing a lengthy, costly, and inflexible process.  ...  and drastically improving the performance of applications that are offloaded to the data plane.  ...  Second, they present severe consequences on the network operation when they are installed at the last mile (i.e., far from the edge).  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
This closed-design paradigm has limited the capability of the switches to proprietary implementations which are hard-coded by vendors, inducing a lengthy, costly, and inflexible process.  ...  and drastically improving the performance of applications that are offloaded to the data plane.  ...  ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC).  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

The application of cryptography for data base security

Ehud Gudes, Harvey S. Koch, Fred A. Stahl
1976 Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76  
On the other hand, the computer will now be used to aid in the decrypting and to search at high speed through very large numbers of possible transformations.  ...  That is, the cooperation of both access control and cryptographic transformations is needed to assure the security of a data base system.  ...  I I NP FOR T H IS s t a t i s t i c s I S : F i g u r e A . 1 1 -V E R N A M -C h a ra c te r S t a t i s t i c -î T U D HISTOGRAM OF THE 70 MOST FREQUENT CHARACfERS = 1 6 .fl3 P OCCURENCES I i K  ... 
doi:10.1145/1499799.1499814 dblp:conf/afips/GudesKS76 fatcat:7er62mgjbfcb7cwfnoa6klhjoa

How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
In this paper we provide a structured overview of existing exchange formats and protocols. We evaluate and compare the exchange formats and protocols in context of high-speed networks.  ...  For our overview, we review different exchange formats and protocols with respect to their use-case scenario, their interoperability with network flow-based data, their scalability in a high-speed network  ...  ACKNOWLEDGMENT This work was partly supported by the German Federal Ministry of Education and Research under grant number 16BY1201F (iAID) and by CASED.  ... 
doi:10.1109/inm.2015.7140300 dblp:conf/im/SteinbergerSGB15 fatcat:57jujctbxvcwddvvrnb76u4yyi

On the reliability of electronic payment systems

R.J. Anderson, S.J. Bezuidenhoudt
1996 IEEE Transactions on Software Engineering  
The high costs of billing systems suggest that prepayment mechanisms could play a large part in the solution.  ...  These meters are used by a number of utilities from Scotland to South Africa, and they present some interesting reliability challenges.  ...  Acknowledgements: we would like t o acknowledge a discussion with Nick MacLaren on the administrative costs of time-sharing systems, and assistance generally from the South African meter industry and from  ... 
doi:10.1109/32.502222 fatcat:gmgkejok2fcv5o76el4no3iqea
« Previous Showing results 1 — 15 out of 402 results