A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Public-Key Cryptography (Dagstuhl Seminar 16371)
2017
Dagstuhl Reports
This report documents the program and results of Dagstuhl seminar 16731 "Public-Key Cryptography" which took place September 11-16, 2016. ...
The goal of the seminar was to bring together different subareas from public-key cryptography and to promote research among these areas. ...
is transferred from an idealized single-user setting to the more realistic multi-user setting is impossible to avoid, and a lower tightness bound for non-interactive key exchange protocols. ...
doi:10.4230/dagrep.6.9.46
dblp:journals/dagstuhl-reports/Fischlin0PR16
fatcat:figv27hq4feibl5nzb7snrtm2i
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments
2021
Journal of Cryptology
AbstractWe consider the theoretically sound selection of cryptographic parameters, such as the size of algebraic groups or RSA keys, for TLS 1.3 in practice. ...
For some building blocks, such as the symmetric record layer encryption scheme, we can then rely on prior work to establish tight security. ...
To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. ...
doi:10.1007/s00145-021-09388-x
fatcat:vhz6kgeejfd7tgfvbowgjbrfne
Broadband satellite multimedia
2010
IET Communications
RP3 Between the MIHF on a MIH-enabled BSM ST and an MIH PoS on a non-PoA BSM network entity. RP4 Between the MIHF PoS and an MIH non-PoS instance in different BSM network entities. ...
A PoA is the network side of a layer 2 link that includes an MN as the other end point. Thus, the MIH framework supports both L2 and L3 transports for exchanging MIH information. ...
The authors would also like to acknowledge the contributions of the whole ETSI BSM working group. ...
doi:10.1049/iet-com.2009.0453
fatcat:vxqqkncfqjawpet45746ido2jq
Queen bee in a beehive: WHO as meta-governor in global health governance
2018
BMJ Global Health
Acknowledgements We thank our colleague Kristof Decoster (Institute of Tropical Medicine, Antwerp) for providing comments on draft versions of the article. ...
There is much debate on how to move beyond the current institutional gridlock and shift towards a more open collaborative, 'adaptive' governance. 12 The world has shifted to a 'multiorder' system in ...
The major challenge in adapting the WHO to an age of chaotic pluralism is the function of ensuring democratic legitimacy. ...
doi:10.1136/bmjgh-2017-000448
pmid:29527336
pmcid:PMC5841503
fatcat:42fmfu42cjdx7mvtdtlmidhkxy
Business-to-business interactions: issues and enabling technologies
2003
The VLDB journal
The ubiquity and the affordability of the Web has made it possible for the masses of businesses to automate their B2B interactions. ...
Layers of B2B interaction frameworks Interactions in B2B applications occur in three layers: communication, content, and business process layers. ...
The authors would like to thank the anonymous reviewers for their valuable comments on earlier drafts of this paper. ...
doi:10.1007/s00778-003-0087-z
fatcat:mmw2g7tzbbeqjak3ck7slt43gu
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering
[chapter]
2004
Lecture Notes in Computer Science
In particular, the security of these algorithms may completely break under (feasible) attacks that tamper with the secret key. ...
In particular, we define a model of security against an adversary who is allowed to apply arbitrary feasible functions f to the secret key sk, and obtain the result of the cryptographic algorithms using ...
We acknowledge Eric Lehman for suggesting the general solution for the non-adaptive key extraction procedure described in the full version of this paper. ...
doi:10.1007/978-3-540-24638-1_15
fatcat:wifjz2dcmjellpyswovgdca5qu
Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)
2016
International Journal of Computer Applications
above issues I recommend Virtualized Private cloud with versatile system, which drives the displayed issues, thus keeping in mind the end goal to give the boundless services, it will demonstrate high security ...
This is mainly because of the inherent multifaceted nature of the field and contrasts in subtle elements between a lot of existing open and private cloud infrastructures. ...
We display the construction modelling and plan of an intercloud secure communication framework that offers the elements of dynamic and adaptable virtual system development, productive and versatile key ...
doi:10.5120/ijca2016907720
fatcat:vhdf66jm5fft3bb2bvef56li4a
Security Protocols as Environments: a Lesson from Non-collaboration
2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing
, not simply as sequences of message exchanges. ...
We motivate that indeed there is room in SPA for a fruitful notion of defense and that the conceptual bridge lies in multiple non-collaborating attackers. ...
ACKNOWLEDGEMENTS The work presented in this paper was partially supported by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu ...
doi:10.4108/icst.collaboratecom.2011.247156
dblp:conf/colcom/FiazzaPV11
fatcat:7nnjsgoeizaklezbaoymdynzti
Requirements for forming an 'e-supply chain'
2009
International Journal of Production Research
In today's digital economy, web-based integration of the enterprises to form an e-supply chain is a critical weapon for orchestrating the whole supply chain towards competitiveness. ...
During the study, requirements are gathered by making a review of recent literature. ...
Source: adapted from Bendoly and Jacobs (2005) .
Figure 3 . 3 Three-tier architecture, as defined inLan (2005).
Table 1 . 1 Basic characteristics of loose and tight types of integration. ...
doi:10.1080/00207540701802460
fatcat:2oxzpshkgfdztmfz7vct6hk7au
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging
2018
Proceedings on Privacy Enhancing Technologies
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of communication. ...
In this work, we propose three new strongly deniable key exchange protocols—DAKEZ, ZDH, and XZDH—that are designed to be used in modern secure messaging applications while eliminating the weaknesses of ...
our security proofs, Peter Schwabe for his comments on contributiveness and New Hope, and David Jao for his comments on SIDH. ...
doi:10.1515/popets-2018-0003
dblp:journals/popets/UngerG18
fatcat:w4k3paha5zcgvkj46gs33zwe4i
Toward a Lightweight Authentication and Authorization Framework for Smart Objects
2015
IEEE Journal on Selected Areas in Communications
The resulting architecture is intended to provide a holistic security approach to be leveraged in the design of novel and lightweight security protocols for IoT constrained environments. ...
In this emerging ecosystem, the application of standard security technologies has to cope with the inherent nature of constrained physical devices, which are seamlessly integrated into the Internet infrastructure ...
13.121, named BASTION "Bootstrapping, Authentication, Security and Trust for the Internet of Things Networks". ...
doi:10.1109/jsac.2015.2393436
fatcat:zjjuso7gvjdblkawalxd44ku5q
Distributing the setup in universally composable multi-party computation
2014
Proceedings of the 2014 ACM symposium on Principles of distributed computing - PODC '14
Any such entity is thus a single point of failure, and security fails catastrophically in case the setup entity is subverted by an adversary. ...
For example, we show that given m complete setups, up to t of which might be actively corrupted in an adaptive manner, general multiparty computation with no honest majority is possible if and only if ...
On a technical level, Groth and Ostrovsky [15, Theorem 4] prove impossibility of implementing non-interactive zero-knowledge for languages that are not in P/poly when more than half the CRSs are faulty ...
doi:10.1145/2611462.2611480
dblp:conf/podc/KatzKZZ14
fatcat:q6hwexupdzcg3jndnfy6oyi6wy
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
[chapter]
2016
Lecture Notes in Computer Science
The problem of finding loss must be addressed towards tight(er) reductions under this type. ...
We also give the application of the iterated random oracle in the key exchange. ← KeyGen(Param, mpk, msk, upk) on the condition that F (upk, str * ) = 1 and O D (·) is a decryption oracle that on input ...
Identity-Based Non-Interactive Key Exchange (IB-NIKE). ...
doi:10.1007/978-3-662-53890-6_25
fatcat:ieai7oa7wvfoxlptebnhjvsjne
System architecture for collaborative security and privacy monitoring in multi-domain networks
2011
2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application
iii) Mitigation Control Point, in charge of providing a unique interface towards mitigation equipments, iv) an Inter-domain Exchange Point devised to provide gateway functionalities (at both control and ...
security and privacy monitoring system. ...
The views and conclusions contained in this paper are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements of the European Commission ...
doi:10.1109/imsaa.2011.6156360
fatcat:7lpbvqzkjjg5dcjlnrvvjpspim
A Perspective on the Future of Middleware-based Software Engineering
2007
Future of Software Engineering (FOSE '07)
Acknowledgments This work is part of the PLASTIC 5 and AMIGO 6 IST projects, funded by the European Commission under the FP6 contract numbers 026955 and 004182 respectively. ...
Depending on the middleware chosen for developing the software system, the system's functional and non-functional properties (e.g., synchronous or asynchronous communication, tight or loosely coupled interaction ...
Both OO and CB middleware assure non-functional properties such as reliability, scalability, and security. ...
doi:10.1109/fose.2007.2
dblp:conf/icse/IssarnyCG07
fatcat:frkdbpnojze3dfku2r2hpynlry
« Previous
Showing results 1 — 15 out of 33,547 results