Top PDF A search-based approach to the automated design of security protocols

A search-based approach to the automated design of security protocols

A search-based approach to the automated design of security protocols

sender used to encrypt this message, and a series of C indices that reference be- liefs currently held by the sending principal. So, the sender is vs mod N; receiver is vr mod N; key is vk mod ( 2N + C 2 N ) (N principals may have N private keys, N public keys, and share C 2 N symmetric keys); the first belief in the message is belief vb 1 mod T etc., where the sender has T current beliefs, indexed 0 . . . T − 1. belie f [ 0 ] is the null belief (which allows us to model easily messages with fewer than C ‘real’ beliefs). The vector of the receiver’s current beliefs is updated af- ter each message is sent (see below). In this way, an arbitrary sequence of inte- gers can be interpreted as a feasible protocol (senders only ever send beliefs they actually hold). This allows a very simple move strategy for local search – sim- ply randomly perturb any of the integers involved in any message. Although the interpreted protocol may be feasible, it may not satisfy our required goals. The fitness function, given in section 3.3 below, measures how close it comes to achieving the required goals and our search seeks to find a protocol that satisfies all these goals.
Show more

103 Read more

An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

Software wrapper technology has been investigated in many fields, including computer security, software engineering, database systems and software dependability. In the context of computer security, software wrappers have been used to enforce a specific security policies [16] and protect vulnerable assets [17]. It has also been shown that security wrappers deployed within an operating system kernel can be used to meet application specific security requirements [18]. Software wrappers have been widely applied in the inte- gration of legacy systems [19], where they act as connectors which allow independent systems to interact and the recon- ciliation of functionality [20] [21]. Examples of this can be found in the field of database systems, where software wrappers are used to encapsulate legacy databases [22] [23]. Software wrappers have been extensively investigated in the context of operating system dependability [24] [25], where emphasis is placed on wrapping device drivers and shared libraries [26] [27]. Software wrappers have also been used to address the more general problem of improving dependability in commercial-off-the-shelf software [28], as well as several more specific software dependability issues, such as the problem of non-atomic exception handling [14]. The proposed methodology is related to [29], where wrap- pers were used to detect contract violations in component- based systems. In contrast, the proposed methodology com- bines software wrappers that implement standard predi- cates and variable replication to enhance dependability. The variable-centric approach, facilitated by the metrics devel- oped in [15], also differentiates the proposed methodology.
Show more

9 Read more

A  mechanical  approach  to  derive  identity-based  protocols  from  Diffie-Hellman-based  protocols

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols

the MTI protocol [35], the Unified Model protocol (UMP) [2, 8], the MQV protocol [37, 34], and the HMQV protocol [31]. Throughout the paper, we will use the term “DH-based protocols” to refer to these implicitly authenticated DH-based protocols. A key goal of DH-based protocols is to achieve the same level of efficiency as the basic DH protocol, both in terms of communication and computation, when the possible transmission and verification of public key certificates are excluded from consideration. The design and security of DH-based protocols have been extensively studied over the last decades and are now fairly well-understood. For example, some recent DH- based protocols were proven secure in the extended Canetti-Krawczyk (eCK) model [33, 47, 30].
Show more

36 Read more

A Numerical Solution to the Inverse Problem of Supersonic-Nozzle Design

A Numerical Solution to the Inverse Problem of Supersonic-Nozzle Design

The numerical design of a nozzle is sensitive to stability in the region of supersonic flow. In the numerical algorithm presented in this paper the instability is avoided by the introduction of an analytically set pressure distribution on the axis of the axisymmetrical supersonic nozzle. The flow parameters of the inverse designed nozzle are checked by the application code FLUENT and they show a regular distribution on cross-sections along the nozzle.

8 Read more

The Design and Optimization of Automated Storage and Retrieval Systems

The Design and Optimization of Automated Storage and Retrieval Systems

In this study, automated warehouses, also named automated storage and retrieval systems (ASRS), are presented. In the past few decades, the share of ASRS, which in comparison with conventional warehouses provides a higher level of technological efficiency, has increased. The use of the ASRS already received consideration decades ago, when in 1962 the company Demag created the first ASAR [2]. The aforementioned ASRS was the first high-bay warehouse measuring 20 meters in height, which marked the beginning of a new era in the development of material handling equipment in Europe. The ASRS consists of storage racks (SRs), a storage and retrieval machine (SR machine), accumulating conveyors, an input and output location (I/O location) and a computer system for managing and organizing the activities in the warehouse. In comparison with conventional warehousing systems, the key advantages of the ASRS are: (i) high throughput capacity Pf, (ii) high warehouse volume Q (rack capacity), (iii) high reliability and better control of the warehousing process, (iv) improved safety conditions and (v) a decrease in the amount of damage and the loss of goods. Due to advanced technology and the complete automation of the system, the ASRS demands extensive investment. Additionally, those ASRSs where the SR machine operates only in the single picking aisle are rather inflexible as far as a possible change of the throughput capacity of the warehouse is concerned.
Show more

24 Read more

Nonlinear Coordinated Steering and Braking Control of Vision-Based Autonomous Vehicles in Emergency Obstacle Avoidance

Nonlinear Coordinated Steering and Braking Control of Vision-Based Autonomous Vehicles in Emergency Obstacle Avoidance

Webcams typically include a lens, an image sensor, and some support electronics. Various lenses are available, the most common being a plastic lens that can be screwed in and out to set the camera's focus. Fixed focus lenses, which have no provision for adjustment, are also available. Image sensors can be CMOS or CCD, the former being dominant for low-cost cameras, but CCD cameras do not necessarily outperform CMOS-based cameras in the low cost price range. Consumer webcams are usually VGA resolution with a frame rate of 30 frames per second. Higher resolutions, in mega pixels, are available and higher frame rates are starting to appear.
Show more

6 Read more

Security Analysis of Quantization Schemes for Channel-based Key Extraction

Security Analysis of Quantization Schemes for Channel-based Key Extraction

coefficient of the preliminary key material. For better com- parison we also plotted the simulation results from Section 2. The BDR distributions of the real-world measurements are almost always similar to the pattern of the simulation. Stronger differences are given for the scheme of Aono et al. [2] and Zenger et al. [16]. Note that increasing the num- ber of evaluated blocks may further improve the results. Fur- ther, our results show that the schemes by Hamida et al. [8] and Ambekar et al. [1] do not lead to a BDR of 0.5 for low correlated channel profiles. This leads to a serious security problem, in so far as even with totally uncorrelated mea- surements an adversary may recover partial information of the initial key material. The schemes introduced by Jana et al. [10], Azimi et al. [3] and Mathur et al. [11] show almost linear decrease of BDR with increasing correlation. As this linear behavior lets an adversary learn a lot of secret infor- mation already with reasonably good correlations, this could corrupt the security of the scheme. The scheme of Zenger et al. [16] shows strong security properties for potential attack- ers with low correlated observations, however it also shows very bad performance for highly correlated channel profiles. The scheme by Tope et al. [14] shows good simulation re- sults, however, it produces wide-spreaded real-world values which prevent the tight definition of boundaries. The scheme by Aono et al. [2] shows different behavior between simula- tion and real-word evaluation. In the real-world scenario, the scheme seems to have pretty good performance. This is also true for the schemes by Jana et al. [10] and Patwari et al. [12] The shape of the distributions of schemes show the wanted results: high BDR for low correlations and low BDR for high correlations without a fluent transition between both. The scheme by Patwari et al. [12] seems to have the best property with its abrupt change of BDR at a high correlation as it means that an adversary with lower correlation will not learn any information while both parties gather almost the same information if they have relatively correlating channel
Show more

6 Read more

The efficacy of a preparatory phase of a touch-based approach in treating chronic low back pain: a randomized controlled trial

The efficacy of a preparatory phase of a touch-based approach in treating chronic low back pain: a randomized controlled trial

The results of our study are encouraging with regard to our hypothesis that a preparatory phase that is pleasant to the touch directs the attention of the patient away from pain; in combination with conventional techniques, this approach increases the efficacy of traditional massage in reducing chronic pain: the experimental treatment had an effect com- pared to the traditional treatment. Both approaches in the TMG and SMG mitigated pain in CLBP, but in the SMG, this improvement was much more acute compared with the TMG on all pain scales, with better maintenance at 3 months follow-up (Waddell Index, McGill PRIA, Tot, and NWC, as shown in Table 2).
Show more

9 Read more

An Optimized Performance Amplifier

An Optimized Performance Amplifier

supply voltage of 1.0 V, the design performance has been verified at different process corner cases including slow, nominal, and fast models for both nMOS and pMOS devices as well as temperature variations spanning from –40°C to 85°C. Also, the actual MOS devices have been implemented to realize the switches controlled by different clock phases. To damp the oscillations caused by the bondwire parasitic inductors, the MOS decoupling capacitors are implemented. The optimization process is depicted in Fig. 2. Table 2 also lists an overal specification of the optimization process.
Show more

5 Read more

The Influence of Multi Platform Space on the Formation of a Programming Languages Stack in the Competence Based Approach to Computing Training at Univ

The Influence of Multi Platform Space on the Formation of a Programming Languages Stack in the Competence Based Approach to Computing Training at Univ

gap between educational attainment acquired by students at Universities and the trends of modern information technologies development, as well as an increase in the number of levels of computing platforms and their ecosystems. The analysis of the most highly paid jobs, based on survey of Stack Overflow developers, has shown that those in most demand are : DevOps specialists, Data scientists, Back-end developers, Full- Stack developers, Embedded developers. Training programs, however, continue to be improved in five key educational areas: Computer Science (CS), Computer Engineering (CE), Software Engineering (SE), Information Systems (IS), Information Technology (IT). The level of future specialists’ competence is constantly improving through improvement of university programs developed under the aegis of organizations, i.e. the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). That is why it is important to explore the opportunities for improvement of modern students’ competency level through the development of curricula based on the formation of a programming languages stack, necessary for their further integration into the processes of society informatization.
Show more

7 Read more

Round-Efficient  Concurrently  Composable  Secure  Computation  via  a  Robust  Extraction  Lemma

Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma

Our Results. We answer the above question in the affirmative and provide a O(log e n) round construction of concurrently secure computation in the plain model. Our construction satisfies the angel-based composable notion of security [PS04, CLP10]. To obtain our result, we construct a “CCA-secure commitment” protocol in O(log e n) rounds, based only the assumption that one- way functions exist. CCA secure commitments were introduced in [CLP10]; roughly speaking, a commitment protocol is CCA-secure if it remains hiding even when the adversary is given an oracle that can open all commitment values (except the commitment given as a challenge to the adversary). In [CLP10], Canetti et al. show how to construct a protocol that securely realizes any functionality—under the angel-based composable notion of security—given an (appropriate) protocol for CCA secure commitments (see full version of [CLP10]). Prior to our work, the best known construction for CCA secure commitments based on standard (polynomial time) assumptions, required n rounds [CLP10, LP12]. In contrast, the round complexity of our protocol matches that of the best known constructions for concurrent extractable commitment schemes [PRS02, MOSV06]. A robust concurrent extraction lemma. A key technical tool that we introduce is a lemma that allows robust extraction of secrets from an adversarial committer A ∗ in the concurrent setting. We call this lemma, the robust concurrent extraction lemma, which is of independent interest. Roughly speaking, the lemma is a strengthening of the concurrent extraction mechanism for the PRS preamble [PRS02] (we shall call this the PRS commitment), and states that concurrent extraction can be performed even in the presence of an external protocol which cannot be rewound by the “simulator.” More precisely, consider an adversarial committer A ∗ who commits to multiple values in con- current sessions of the PRS commitment to honest receivers; let us label these sessions as the right
Show more

34 Read more

Performance Analysis and Enhancement in IPSec VPN to Reduce Connection Establishment Overhead and Transmission Delay: Part - 1

Performance Analysis and Enhancement in IPSec VPN to Reduce Connection Establishment Overhead and Transmission Delay: Part - 1

used properly Triple DES enjoys much wider use than DES because DES is so easy to break with today rapidly advancing technology in 1988 the Electronic frontier foundation using a specially developed computer called the DES cracker managed to break DES in less than 3 days and this was done for under $ 250,000 The encryption chip that powered the DES cracker was capable of processing 88 billion keys per second In addition it has been shown that for a cost of one million dollars a dedicated hardware device can be built than can search all possible DES keys in about 3.5 hours This just serves to illustrate that any organization with moderate resources can break through DES with very little effort these days No sane security expert would consider singes to protect data {10} Triple DES was the answer to many of the shortcomings o9f DES Since it is based on the DES algorithm it is very easy to modify existing software to use Triple DES It also has the advantage of proven reliability and a longer key length that e3liminates many of the shortcut attacks that can be used to reduce the amount of time it takes to break DES However even this more powerful version of DES may not be strong enough to protect data for very much longer The DES algorithm itself has become obsolete and is in need of replacement To this end the National Institute of standards and Technology ( NIST) is holding a competition to develop the advanced Encryption standard ( AES) as a replacement for DES Triple DES has been endorsed by NIST as temporary standard to be used until the AES is finished sometime in 2011.
Show more

9 Read more

Evidence based approach to the treatment of community-associated methicillin-resistant <em>Staphylococcus aureus</em>

Evidence based approach to the treatment of community-associated methicillin-resistant <em>Staphylococcus aureus</em>

The assessment of in vitro activity of a given compound against select clinically significant pathogens has always been an early component in the development of new antimicrobials. Once the in vitro activity has been well defined, additional drug-specific data follow including basic pharmacokinetic parameters, human safety data, and ultimately, human outcome data. Specific to S. aureus, and more specifically MRSA, the differentiation into CA-MRSA and HA-MRSA subsets is a relatively new concept. Consequently, in vitro data for MRSA is not often subdivided into CA-MRSA or HA-MRSA. For the assessment of in vitro activity of various drugs against CA-MRSA, data are currently limited but accumulating. While it is unclear whether the genotypic identification of a given strain is clinically significant once susceptibility testing has been performed, it is clear that the susceptibility patterns differ based on the origin of the strain.
Show more

14 Read more

Design and fabrication of a labview automated computer based fire  fighting system

Design and fabrication of a labview automated computer based fire fighting system

Fire detection, control and notification at early stages are of great importance as human life and property is concerned. In this paper we report the design and fabrication of simple, cheap and reliable computer based fire fighting system for use at homes, offices, supermarkets, schools among others. The system comprised of fire detection units made of smoke and temperature sensors, computer display unit, actuators, Bluetooth and GSM networks. Systems functionality was tested by introducing smoke and raising temperature of the surrounding beyond a set threshold levels. With smoke introduced, sensors were activated within 5-10 seconds while with temperature sensors activation took 5-20 seconds. Fire scenes were displayed by the computer 5seconds after detecti and respective sprinklers triggered 10seconds later. Bluetooth enabled mobile phone interfaced to the Bluetooth enabled computer via Bluetooth network was able to send a short preset text message to a target remote mobile phone connected to it through GSM network within a period of 60
Show more

6 Read more

A Sociolinguistic Approach to Security Challenges and Sustainable National Development in Nigeria

A Sociolinguistic Approach to Security Challenges and Sustainable National Development in Nigeria

Security challenges in Nigeria are numerous. Security has been defined by Cambridge Dictionaries (online) as protection of a person, building, organization, or country against threats such as crime or attacks. Adebakin,(2012) viewed security as freedom from danger or threats, and the ability of a nation to protect and develop itself, promote and cherish values and legitimate interests and enhance the well being of its people. It focuses on physical, emotional and psychological sense of belonging to a social group which can offer one protection. Any situation contrary to this is regarded as a state of insecurity . The Advanced Learner’s Dictionary defines insecurity as “the condition of being susceptible to harm or injury”. It is the state of fear or anxiety; lack or inadequate freedom from danger. This definition reflects physical insecurity which is the most visible form of insecurity, and it feeds into many other forms of insecurity such as economic insecurity and social insecurity. However, it has been generally argued that security is not the absence of threats or security issues, but the ability to rise to the challenges posed by these threats with expediency and expertise.
Show more

8 Read more

Big Data Security Issues and Quantum Cryptography for Cloud Computing

Big Data Security Issues and Quantum Cryptography for Cloud Computing

According to [20], following priorities are unavoidable when big data security are considered in a cloud environment. Firstly, the service provider should ensure that confidentiality, integrity, and availability are manageable with or without any conditions in anywhere around the cloud environments. Secondly, according to the service level agreements of resources used in the cloud computing, the service provider should check the features and functionalities of the cloud resources. Service providers offer all latest versions of the tools and resources to protect their services. Capabilities of self-service and achievable scaling are also provided through the automation and simplifications. Authentication is also one of the priorities.
Show more

7 Read more

Segregation Approach for User Sending Data on Content Sharing Sites

Segregation Approach for User Sending Data on Content Sharing Sites

Content-based retrieval [2] is ultimately dependent on the features used for the annotation of data and its efficiency is dependent on the invariance and robust properties. The Polar Fourier Transform (PFT) is similar to the Discrete Fourier Transform in two dimensions but uses transform parameters radius and angle rather than the Cartesian co-ordinates. To improve implications for content based retrieval of natural images where there will be a significantly higher number of textures.[6] Local radial symmetry is to identify regions of interest within a scene. A facial feature detector and as a generic region of interest detector the new transform is seen to offer equal or superior performance to contemporary techniques. The method has been demonstrated on a series of face images and other scenes, and compared against a number of contemporary techniques from the literature. Equal or superior performance on the images tested while offering significant savings in both the computation required and the complexity of the implementation. Security and privacy in Social networks and more generally in Web 2.0 are emerging as important and crucial research topics [7]. SNs have been studied by scholars from different disciplines: sociologists, HCI, computer scientists, economists etc. In this section, we overview some of previous work that is most relevant to collective privacy management for SNs Several studies have
Show more

7 Read more

Establishment of Neurospora crassa as a host for heterologous protein production using a human antibody fragment as a model product

Establishment of Neurospora crassa as a host for heterologous protein production using a human antibody fragment as a model product

Strains used in this study are listed in Additional file  1: Table S5. For the construction of strains via transfor- mation, recipient strains with respective deletions and mutations had to be generated. When combining multi- ple deletions, crosses were performed in multiple steps on Westergaard’s medium [71]. Mating types were deter- mined by crossing with the N.  crassa wild-types FGSC #2489 and FGSC #988. Strains with single gene dele- tions were obtained from the Neurospora gene knock- out library [11]. When combining multiple deletions based on the hph cassette, correct strains were identified by PCR analysis using genomic DNA as a template (for primers see Additional file  1: Table S4). Presence of the exo-1 mutation was determined by a plate assay based on starch degradation. Spores of the respective strain were spotted on solid Vogel’s medium containing sorbose (20  g/L) and starch (5  g/L) and incubated for 2–3  days at 30  °C. The agar was then dyed with Lugol’s solution (20 g/L potassium iodide and 10 g/L iodine). Strains car- rying the exo-1 mutation developed a clear halo around the spots due to increased starch degradation.
Show more

15 Read more

A Contribution for a Pragmatics-Based Approach to Concurrent Engineering Implementation

A Contribution for a Pragmatics-Based Approach to Concurrent Engineering Implementation

The paper investigates how a pragmatics-based approach may influence Concurrent Engineering (CE) implementation projects. Pragmatics, a field of semiotics, is used as a perspective for analyzing, as an instrument for constructing manufacturing systems and, in this particular research, as an instrument for CE implementation projects. In particular, as a part of the CE implementation methodology, modeling and the effects of different interpretations (as pragmatics aspects) of the assessment of processes’ simultaneity in a manufacturing organization are studied. The underlying thesis is that different interpretations significantly influence the perception of the organization’s reality, which has an impact on the project’s success. As a representation class, the so-called Simultaneity (Concurrency) Matrix (SCM) was used for simultaneity process assessment. The thesis is validated in two manufacturing companies. The results suggest that further improvements of the CE implementation methodologies, when using the pragmatics-based approach, lead to better quality of decisions and provide some assurance for the success of short-time and low-cost CE implementation projects.
Show more

12 Read more

A Survey on Anonymous Routing Protocols in MANETs

A Survey on Anonymous Routing Protocols in MANETs

Anonymous routing protocols which provide high security and privacy in MANET has been proposed by this paper. As anonymity is maintained in identity of sender, receiver as well as in rout, many attacks can be prevented from MANET. This survey not only shows the significance but also focuses the limitations of all anonymous routing protocols. This shows that complete anonymous protection in MANET cannot be achieved. So in future work ,the existing protocols can be modified to get high security and privacy in terms of anonymity and to get high performance.
Show more

5 Read more

Show all 10000 documents...