Filters








1,691 Hits in 3.8 sec

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols [article]

Luca Arnaboldi, Roberto Metere
2019 arXiv   pre-print
In this paper, we showcase the effectiveness of this novel approach by demonstrating how easy MetaCP makes it to design and verify a protocol going from the graphical design to formally verified protocol  ...  We propose MetaCP, a Meta Cryptography Protocol verification tool, as an automated tool simplifying the design of security protocols through a graphical interface.  ...  ACKNOWLEDGEMENT This research is supported by The Alan Turing Institute and an Innovate UK grant to Newcastle University through the e4future project, as well as Arm Ltd. and EPSRC under grant EP/N509528  ... 
arXiv:1910.02656v1 fatcat:v5a35t4jzvfslb2eq2cszgiqba

Authentication strategies in vehicular communications: a taxonomy and framework

Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk
2021 EURASIP Journal on Wireless Communications and Networking  
However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation.  ...  The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement  ...  Once a verification approach is selected, the design phase concludes. Case studies A case study approach is employed to demonstrate the usefulness of the proposed taxonomy and framework.  ... 
doi:10.1186/s13638-021-01968-6 doaj:605637f569e947dea2c999c7748c0858 fatcat:3gmlzv2g25fs5gzi4tgcpi322m

Security Approaches for Information-Centric Networking [chapter]

Walter Wong, Maurcio Ferreira
2012 Applied Cryptography and Network Security  
for Information-Centric Networking Security Approaches for Information-Centric Networking www.intechopen.com  ...  Security Approaches for Information-Centric Networking Fig. 1 . 1 Fig. 1.  ...  Security Approaches for Information-Centric Networking, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/35557 fatcat:m5psjnyqhvh3vnfqytatfht5qm

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [article]

F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, B. Wiedersheim, E. Schoch, T.-V. Thong, G. Calandriello, A. Held, A. Kung, J.-P. Hubaux
2009 arXiv   pre-print
In order to show the feasibility of secure VC, certain implementations are required. In [1] we discuss the design of a VC security system that has emerged as a result of the European SeVeCom project.  ...  Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.  ...  Based on a set of design principles, aiming at a practical system that can be readily adopted towards deployment, we designed a comprehensive solution, a security architecture for VC systems.  ... 
arXiv:0912.5393v1 fatcat:g3mt752uondbvola2ta5pqgrpe

Swift

Flutra Osmani, Victor Grishchenko, Raul Jimenez, Björn Knutsson
2012 Proceedings of the First Workshop on P2P and Dependability - P2P-Dep '12  
Our design integrates components while highly prioritizing modularity and sketches a path for piecemeal adoption which we consider a critical enabler of any progress in the field.  ...  ABSTRACT A common pitfall of many proposals on new informationcentric architectures for the Internet is the imbalance of upfront costs and immediate benefits.  ...  Swift was originally designed to be a replacement for the BitTorrent protocol and inherits some of the characteristics that have made BitTorrent successful, but was not intentionally designed according  ... 
doi:10.1145/2212346.2212350 fatcat:okvzalg7uba7rdx7dcq4cpm42y

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems

Haider Abbas, Hiroki Suguri, Zheng Yan, William Allen, Xiali Sharon Zhang
2020 IEEE Access  
In the article ''A novel data analytical approach for false data injection cyber-physical attack mitigation in smart grids,'' Wang et al. developed a data analytical approach based on a data-centric paradigm  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ the verification of cryptographic hash functions through the precision of protocol consistency.  ... 
doi:10.1109/access.2020.3036713 fatcat:mmmaqfaovfhtlmms7iqxykxnjq

Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems

Ludovic Apvrille, Yves Roudier
2014 Electronic Proceedings in Theoretical Computer Science  
After the requirements captured are derived into security and cryptographic mechanisms, security properties can be formally verified over this design.  ...  We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at fostering the collaboration between system designers and security experts at all methodological stages of the development  ...  Typically, when considering a cryptographic protocol, the first pragma means that the data are pre-shared and common to all protocol sessions, and the second one states that the data are shared but have  ... 
doi:10.4204/eptcs.148.2 fatcat:uafkhwqbw5gy7dzwvxiseoon7i

Towards a New Internetworking Architecture: A New Deployment Approach for Information Centric Networks [chapter]

Amine Abidi, Sonia Mettali Gammar, Farouk Kamoun, Walid Dabbous, Thierry Turletti
2014 Lecture Notes in Computer Science  
In this new vision, data will be the heart of the architecture and protocols have to be changed to dial with this concept.  ...  In this paper, we propose new approach based on Bloom Filter to cope with storage space problem in data oriented architecture DONA.  ...  The other side is proposing a revolution approach by re-architecting the internet and giving a new design. New architecture propositions are mostly information centric.  ... 
doi:10.1007/978-3-642-45249-9_36 fatcat:ht2z4rt2g5g3zehvz45hjsuknq

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed  ...  In this paper, we provide a coherent view of the central concepts of SSI, including the components of identity proofing and authentication solutions for different SSI solutions.  ...  The SSI approach is user-centric and demands full control of user over their own data.  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things [article]

Cenk Gündoğan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch
2021 arXiv   pre-print
Even NDN, however, the most prominent ICN protocol, suffers from a lack of deployment.  ...  In our evaluation, we compare NDN with different deployment models of CoAP, including our data-centric approach in realistic testbed experiments.  ...  This work was supported in part by the German Federal Ministry for Education and Research (BMBF) within the projects I3 -Information Centric Networking for the Industrial Internet and the Hamburg ahoi.digital  ... 
arXiv:2104.01587v1 fatcat:4jky74jcsrahfe66mrgwsbsowm

Secure Scuttlebutt

Dominic Tarr, Erick Lavoie, Aljoscha Meyer, Christian Tschudin
2019 Proceedings of the 6th ACM Conference on Information-Centric Networking - ICN '19  
We also provide a comparison with Named Data Networking (NDN), an existing information-centric networking architecture, to motivate a larger exploration of the design space for information-centric networking  ...  Secure Scuttlebutt (SSB) is a novel peer-to-peer event-sharing protocol and architecture for social apps.  ...  After several iterations of protocol design and implementation, SSB has become a stable service for over 10,000 users offering them rich media community applications with strong cryptographic protection  ... 
doi:10.1145/3357150.3357396 dblp:conf/acmicn/TarrLMT19 fatcat:aekfffnurnci3psc7sc7bl7u4u

Security Design for an Inter-Domain Publish/Subscribe Architecture [chapter]

Kari Visala, Dmitrij Lagutin, Sasu Tarkoma
2011 Lecture Notes in Computer Science  
In this paper we present a security design through the network stack for a data-centric pub/sub architecture that achieves availability, information integrity, and allows application-specific security  ...  Several new architectures have been recently proposed to replace the Internet Protocol Suite with a data-centric or publish/subscribe (pub/sub) network layer waist for the Internet.  ...  For example, when IP is seen as a transport protocol in our network architecture, the roles for the endpoints are a source and a destination or for data-centric transport: a data source and a subscriber  ... 
doi:10.1007/978-3-642-20898-0_12 fatcat:sb56lbyrtjesreieq4dpr756ke

Secure naming in information-centric networks

Walter Wong, Pekka Nikander
2010 Proceedings of the Re-Architecting the Internet Workshop on - ReARCH '10  
The proposal uses a new, flexible naming scheme that is backwards compatible with the current URL naming scheme and allows for independent content identification regardless of the routing, forwarding,  ...  In this paper, we present a secure naming system to locate resources in information-centric networks. The main goal is to allow secure content retrieval from multiple unknown or untrusted sources.  ...  Merkle Trees allow for independent block verification because each data chunk carries its own authentication information, allowing verification of data chunks by intermediate devices, for instance, network  ... 
doi:10.1145/1921233.1921248 fatcat:7e26hpyjlrafri65rxdjs7kyjm

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication

Kostantinos Papadamou, Savvas Zannettou, Bogdan-Cosmin Chifor, Sorin Teican, George Gugulea, Annamaria Recupero, Alberto Caponi, Claudio Pisa, Giuseppe Bianchi, Steven Gevers, Christos Xenakis, Michael Sirivianos
2019 Zenodo  
device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental  ...  In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attributebased authentication based on: 1) the seamless integration between usable/strong  ...  Acknowledgment This research has been fully funded by the European Commission as part of the ReCRED project (Horizon H2020 Framework Program of the European Union under GA number 653417).  ... 
doi:10.5281/zenodo.3235403 fatcat:gyielb5wejczlo3kupmzjcurla

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication [article]

Kostantinos Papadamou and Savvas Zannettou and Bogdan-Cosmin Chifor and Sorin Teican and George Gugulea and Annamaria Recupero and Alberto Caponi and Claudio Pisa and Giuseppe Bianchi and Steven Gevers and Christos Xenakis and Michael Sirivianos
2019 arXiv   pre-print
device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental  ...  In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attribute-based authentication based on: 1) the seamless integration between usable/strong  ...  Acknowledgments This research has been fully funded by the European Commission as part of the ReCRED project (Horizon H2020 Framework Program of the European Union under GA number 653417).  ... 
arXiv:1811.08360v2 fatcat:k25c4zib6zcixb7ac6sm3n347a
« Previous Showing results 1 — 15 out of 1,691 results