The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we revisit multi-party Diffie-Hellman key exchange (DHKE) protocols by using multi-linear mappings and Weil pairings over elliptic curves. We show how to construct a 4-linear Weil pairing and illustrate the approach by examples. Finally, we present several necessary conditions to find a distortion map for a 5-party DHKE protocol.
The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop...
Remote data possession checking plays a crucial role in cloud data storage. It allows the owners to verify whether their data are correctly stored in the Cloud without downloading them. To solve this problem, there are many methods proposed such as MAC-based methods, RSA- based homomorphic methods and BLS-based homomorphic methods.This paper presents and compares auditing methods which are based on...
This paper describes a methodology for hardware/software formal co-verification. In the proposed methodology, a unified computational model is constructed for a hardware/software system under verification, in which the software and the hardware are tightly connected. In addition, we proposed a systematic method to formulate properties for the system using extracted information from software programs...
This paper presents the design and evaluation of a novel distributed shared hosting approach, DMap, for managing dynamic identifier to locator mappings in the global Internet. DMap is the foundation for a fast global name resolution service necessary to enable emerging Internet services such as seamless mobility support, content delivery and cloud computing. Our approach distributes identifier to...
The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite...
RFID systems are complex hybrid systems, consisting of analog and digital hardware and software components. RFID technologies are often used into critical domains or into harsh environments. But RFID system is only based on low cost equipments which then do not allow achieving robust communications. All these points make the on-line testing of RFID systems a very complex task. Thus, this article proposes...
This paper proposes enhancements to SAT-based property checking with the goal to increase the spectrum of applications where a proof of unbounded validity of a safety property can be provided. For this purpose, invariants are computed by reachability analysis on an abstract model. The main idea of the paper consists in a BDD-based analysis of k-step-induction on the abstract model and its use to guide...
In this paper, we present a collision-free asynchronous multi-channel access protocol for Ad Hoc wireless networks using a single transceiver. Our protocol, dubbed AMMAC for Asynchronous Multi-channel Medium Access Control, targets low-cost and low-power deployments where nodes are equipped with a single transceiver. Other distinguishing features of AM-MAC include its simplicity and the fact that...
Internet is a ubiquitous part of businesses and individuals worldwide. With its popularity on an incline, operating system vendors are developing end-systems that support the new version of Internet Protocol (IPv6) that eventually will replace IPv4. The new version resolves issues that IPv4 has and takes the Internet into the 21st century. Performance of the IP stack and how it associates with operating...
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.