Filters








33,547 Hits in 5.0 sec

Public-Key Cryptography (Dagstuhl Seminar 16371)

Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin, Marc Herbstritt
2017 Dagstuhl Reports  
This report documents the program and results of Dagstuhl seminar 16731 "Public-Key Cryptography" which took place September 11-16, 2016.  ...  The goal of the seminar was to bring together different subareas from public-key cryptography and to promote research among these areas.  ...  is transferred from an idealized single-user setting to the more realistic multi-user setting is impossible to avoid, and a lower tightness bound for non-interactive key exchange protocols.  ... 
doi:10.4230/dagrep.6.9.46 dblp:journals/dagstuhl-reports/Fischlin0PR16 fatcat:figv27hq4feibl5nzb7snrtm2i

On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments

Denis Diemert, Tibor Jager
2021 Journal of Cryptology  
AbstractWe consider the theoretically sound selection of cryptographic parameters, such as the size of algebraic groups or RSA keys, for TLS 1.3 in practice.  ...  For some building blocks, such as the symmetric record layer encryption scheme, we can then rely on prior work to establish tight security.  ...  To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.  ... 
doi:10.1007/s00145-021-09388-x fatcat:vhz6kgeejfd7tgfvbowgjbrfne

Broadband satellite multimedia

Y.F. Hu, M. Berioli, P. Pillai, H. Cruickshank, G. Giambene, K. Kotsopoulos, W. Guo, P.M.L. Chan
2010 IET Communications  
RP3 Between the MIHF on a MIH-enabled BSM ST and an MIH PoS on a non-PoA BSM network entity. RP4 Between the MIHF PoS and an MIH non-PoS instance in different BSM network entities.  ...  A PoA is the network side of a layer 2 link that includes an MN as the other end point. Thus, the MIH framework supports both L2 and L3 transports for exchanging MIH information.  ...  The authors would also like to acknowledge the contributions of the whole ETSI BSM working group.  ... 
doi:10.1049/iet-com.2009.0453 fatcat:vxqqkncfqjawpet45746ido2jq

Queen bee in a beehive: WHO as meta-governor in global health governance

Sara Van Belle, Remco van de Pas, Bruno Marchal
2018 BMJ Global Health  
Acknowledgements We thank our colleague Kristof Decoster (Institute of Tropical Medicine, Antwerp) for providing comments on draft versions of the article.  ...  There is much debate on how to move beyond the current institutional gridlock and shift towards a more open collaborative, 'adaptive' governance. 12 The world has shifted to a 'multiorder' system in  ...  The major challenge in adapting the WHO to an age of chaotic pluralism is the function of ensuring democratic legitimacy.  ... 
doi:10.1136/bmjgh-2017-000448 pmid:29527336 pmcid:PMC5841503 fatcat:42fmfu42cjdx7mvtdtlmidhkxy

Business-to-business interactions: issues and enabling technologies

B. Medjahed, B. Benatallah, A. Bouguettaya, A.H.H. Ngu, A.K. Elmagarmid
2003 The VLDB journal  
The ubiquity and the affordability of the Web has made it possible for the masses of businesses to automate their B2B interactions.  ...  Layers of B2B interaction frameworks Interactions in B2B applications occur in three layers: communication, content, and business process layers.  ...  The authors would like to thank the anonymous reviewers for their valuable comments on earlier drafts of this paper.  ... 
doi:10.1007/s00778-003-0087-z fatcat:mmw2g7tzbbeqjak3ck7slt43gu

Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering [chapter]

Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin
2004 Lecture Notes in Computer Science  
In particular, the security of these algorithms may completely break under (feasible) attacks that tamper with the secret key.  ...  In particular, we define a model of security against an adversary who is allowed to apply arbitrary feasible functions f to the secret key sk, and obtain the result of the cryptographic algorithms using  ...  We acknowledge Eric Lehman for suggesting the general solution for the non-adaptive key extraction procedure described in the full version of this paper.  ... 
doi:10.1007/978-3-540-24638-1_15 fatcat:wifjz2dcmjellpyswovgdca5qu

Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)

Ch. Siva, B. Tarakeswara, B. Sathyanarayana
2016 International Journal of Computer Applications  
above issues I recommend Virtualized Private cloud with versatile system, which drives the displayed issues, thus keeping in mind the end goal to give the boundless services, it will demonstrate high security  ...  This is mainly because of the inherent multifaceted nature of the field and contrasts in subtle elements between a lot of existing open and private cloud infrastructures.  ...  We display the construction modelling and plan of an intercloud secure communication framework that offers the elements of dynamic and adaptable virtual system development, productive and versatile key  ... 
doi:10.5120/ijca2016907720 fatcat:vhdf66jm5fft3bb2bvef56li4a

Security Protocols as Environments: a Lesson from Non-collaboration

Michele Peroli, Luca Vigano', Maria-Camilla Fiazza
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
, not simply as sequences of message exchanges.  ...  We motivate that indeed there is room in SPA for a fruitful notion of defense and that the conceptual bridge lies in multiple non-collaborating attackers.  ...  ACKNOWLEDGEMENTS The work presented in this paper was partially supported by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu  ... 
doi:10.4108/icst.collaboratecom.2011.247156 dblp:conf/colcom/FiazzaPV11 fatcat:7nnjsgoeizaklezbaoymdynzti

Requirements for forming an 'e-supply chain'

Goknur Arzu Akyuz, Mohammad Rehan
2009 International Journal of Production Research  
In today's digital economy, web-based integration of the enterprises to form an e-supply chain is a critical weapon for orchestrating the whole supply chain towards competitiveness.  ...  During the study, requirements are gathered by making a review of recent literature.  ...  Source: adapted from Bendoly and Jacobs (2005) . Figure 3 . 3 Three-tier architecture, as defined inLan (2005). Table 1 . 1 Basic characteristics of loose and tight types of integration.  ... 
doi:10.1080/00207540701802460 fatcat:2oxzpshkgfdztmfz7vct6hk7au

Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

Nik Unger, Ian Goldberg
2018 Proceedings on Privacy Enhancing Technologies  
A deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of communication.  ...  In this work, we propose three new strongly deniable key exchange protocols—DAKEZ, ZDH, and XZDH—that are designed to be used in modern secure messaging applications while eliminating the weaknesses of  ...  our security proofs, Peter Schwabe for his comments on contributiveness and New Hope, and David Jao for his comments on SIDH.  ... 
doi:10.1515/popets-2018-0003 dblp:journals/popets/UngerG18 fatcat:w4k3paha5zcgvkj46gs33zwe4i

Toward a Lightweight Authentication and Authorization Framework for Smart Objects

Jose L. Hernandez-Ramos, Marcin Piotr Pawlowski, Antonio J. Jara, Antonio F. Skarmeta, Latif Ladid
2015 IEEE Journal on Selected Areas in Communications  
The resulting architecture is intended to provide a holistic security approach to be leveraged in the design of novel and lightweight security protocols for IoT constrained environments.  ...  In this emerging ecosystem, the application of standard security technologies has to cope with the inherent nature of constrained physical devices, which are seamlessly integrated into the Internet infrastructure  ...  13.121, named BASTION "Bootstrapping, Authentication, Security and Trust for the Internet of Things Networks".  ... 
doi:10.1109/jsac.2015.2393436 fatcat:zjjuso7gvjdblkawalxd44ku5q

Distributing the setup in universally composable multi-party computation

Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
2014 Proceedings of the 2014 ACM symposium on Principles of distributed computing - PODC '14  
Any such entity is thus a single point of failure, and security fails catastrophically in case the setup entity is subverted by an adversary.  ...  For example, we show that given m complete setups, up to t of which might be actively corrupted in an adaptive manner, general multiparty computation with no honest majority is possible if and only if  ...  On a technical level, Groth and Ostrovsky [15, Theorem 4] prove impossibility of implementing non-interactive zero-knowledge for languages that are not in P/poly when more than half the CRSs are faulty  ... 
doi:10.1145/2611462.2611480 dblp:conf/podc/KatzKZZ14 fatcat:q6hwexupdzcg3jndnfy6oyi6wy

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction [chapter]

Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
2016 Lecture Notes in Computer Science  
The problem of finding loss must be addressed towards tight(er) reductions under this type.  ...  We also give the application of the iterated random oracle in the key exchange. ← KeyGen(Param, mpk, msk, upk) on the condition that F (upk, str * ) = 1 and O D (·) is a decryption oracle that on input  ...  Identity-Based Non-Interactive Key Exchange (IB-NIKE).  ... 
doi:10.1007/978-3-662-53890-6_25 fatcat:ieai7oa7wvfoxlptebnhjvsjne

System architecture for collaborative security and privacy monitoring in multi-domain networks

Sathya Rao, Giuseppe Bianchi, Joaquin Garcia-Alfaro, Francisco Romero, Brian Trammell, Andreas Berger, Georgios Lioudakis, Eugenia Papagianakopoulou, Mariza Koukovini, Karel Mittig
2011 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application  
iii) Mitigation Control Point, in charge of providing a unique interface towards mitigation equipments, iv) an Inter-domain Exchange Point devised to provide gateway functionalities (at both control and  ...  security and privacy monitoring system.  ...  The views and conclusions contained in this paper are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements of the European Commission  ... 
doi:10.1109/imsaa.2011.6156360 fatcat:7lpbvqzkjjg5dcjlnrvvjpspim

A Perspective on the Future of Middleware-based Software Engineering

Valerie Issarny, Mauro Caporuscio, Nikolaos Georgantas
2007 Future of Software Engineering (FOSE '07)  
Acknowledgments This work is part of the PLASTIC 5 and AMIGO 6 IST projects, funded by the European Commission under the FP6 contract numbers 026955 and 004182 respectively.  ...  Depending on the middleware chosen for developing the software system, the system's functional and non-functional properties (e.g., synchronous or asynchronous communication, tight or loosely coupled interaction  ...  Both OO and CB middleware assure non-functional properties such as reliability, scalability, and security.  ... 
doi:10.1109/fose.2007.2 dblp:conf/icse/IssarnyCG07 fatcat:frkdbpnojze3dfku2r2hpynlry
« Previous Showing results 1 — 15 out of 33,547 results