The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In secure two-party computation protocols based on garbled circuit, oblivious transfer (OT) plays an important role in transferring the garbled keys of the participants. In addition to the traditional OT primitive, many other variants of OT have also been presented, such as outsourced oblivious transfer (OOT), cut-and-choose oblivious transfer (CCOT), cut-and-choose bilateral oblivious transfer (CCBOT),...
User constrained devices such as smart cards are commonly used in human-protocol interaction. Modelling these devices as part of human-protocol interaction is still an open problem. Examining the interaction of these devices as part of security ceremonies offers greater insight. This paper highlights two such cases: modelling extra channels between humans and devices in the ceremony, and modelling...
We consider a model of congestion for computer networks based on a continuous-time finite-state homogeneous bivariate Markov chain. The model can be used to evaluate, via computer simulation, the performance of protocols and applications in a network with random path delays and packet losses due to traffic congestion. Only one of the processes of the bivariate Markov chain is observable. In our application,...
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation...
In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes...
We propose a new tool, named DSGen, a distributed synthetic network traffic generation system. It is designed for network experimental in off-line environments. Since the experimental environment has some detective points compared with on-line one in the context of network background traffic and contention for servers' resource with other real users, a complementary approach that designs a system...
Most of the existing encryption schemes used for practical applications rely on un-proven assumptions. The limited access model proposed by Michael Rabin, describes a crypto-system which is provably unbreakable without any assumption on the computational power of an adversary. But this model makes assumption on the inaccessibility of a distributed source of randomness. In this paper we describe precisely...
Periodic, coordinated, checkpointing to disk is the most prevalent fault tolerance method used in modern large-scale, capability class, high-performance computing (HPC) systems. Previous work has shown that as the system grows in size, the inherent synchronization of coordinated checkpoint/restart (CR) limits application scalability; at large node counts the application spends most of its time checkpointing...
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically changed during the verification which can...
The self-similarity becomes one of the method of anomaly detection. The multi-layer `on-off' model of traffic source is developed. The generator implemented according this model allows generate traffic flow characterized by self-similarity. The ability of generation of traffic similar to malicious one is verified by experiments. The results confirm that proposed model is useful to produce traffic...
Based on the interactive proof of Hamiltonian Cycle (HC) of large directed graph, which is a ??-protocol, we construct a perfectly hiding and computationally binding trapdoor commitment in 2-round from any one-way permutation. Then, based on this trapdoor commitment, we construct perfect zero-knowledge argument of knowledge with negligible error probability in 2-round for NP, assuming only the existence...
In this paper, we present a two-party attribute-based key agreement protocol, which is secure in random oracle model under the Bilinear Diffe-Hellman assumption. It is inspired by a fuzzy identity-based encryption scheme first proposed by Sahai and Waters. The attribute-based key agreement scheme is a new type of identity-based key agreement scheme, in which we can view identity as a set of descriptive...
Private scalar product protocols have proved to be interesting in various applications such as data mining, data integration, trust computing, etc. In 2007, Yao et al. proposed a distributed scalar product protocol with application to privacy-preserving computation of trust [1]. This protocol is split in two phases: an homorphic encryption computation; and a private multi-party summation protocol...
Traditional transaction processing aims in delivering the ACID properties (Atomicity, Consistency, Isolation, Durability), that in our days are often relaxed, due to the need for transaction models that suit modern computing environments and workflow management applications. Typical examples are the requirements of long-running transactions in mobile computing or in the web, as well as the requirements...
In the design of wireless networking protocols and systems, simulation has become the primary form of initial validation and performance evaluation. Hence, ensuring the realism of simulators and simulation methods is fundamental for simulated results to be interpretable. In this paper, we provide a simulation framework for infrastructure wireless network traffic that allows researchers to use publicly...
In the paper a model of the traffic in the LAN is presented. In the model the most important components influencing the network traffic are taken into account. Namely, the transmission protocols and information buffering, operational systems and queuing algorithms as well as users' behavior working with the network applications are considered. The model is based on an ldquoon-offrdquo function. It...
In the grid security infrastructure (GSI), cross-domain authentication is based on traditional PKI cross certificate, which brings about problems of certificates management. Encouragingly, identity-based cryptography (IBC) can overcome these problems for its certificate-free feature. Therefore, an identity-based signcryption scheme is proposed in order to meet the requirement of cross-domain authentication...
As an emergence technology, P2P is spreading to distributed simulation area, and many distributed simulation frameworks have used P2P as the middleware to interconnect their existing single processor's simulators to form distributed environments for simulation execution. In terms of simulation time management, most existing tools use a middleware layer to implement and support time management in a...
This paper presents a new concept of security assessment methodology while promoting several areas of its application. Attack pattern analysis, network security monitoring locally or remotely are the major application areas of this concept. Instead of testing each asset or a network node separately by applying repetitive attacks and assessments, the composite system generates and executes attacks...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.