• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,448
Next 10 →

Tinysec: A link layer security architecture for wireless sensor networks

by Chris Karlof, Naveen Sastry, David Wagner - in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract - Cited by 521 (0 self) - Add to MetaCart
the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental

Secure Parameters for SWIFFT (Extended Abstract)

by Johannes Buchmann, Richard Lindner , 2008
"... The SWIFFT compression functions, proposed by Lyubashevsky et al. at FSE 2008, are very efficient instantiations of generalized compact knapsacks for a specific set of parameters. They have the property that, asymptotically, finding collisions for a randomly chosen compression function implies bei ..."
Abstract - Add to MetaCart
The SWIFFT compression functions, proposed by Lyubashevsky et al. at FSE 2008, are very efficient instantiations of generalized compact knapsacks for a specific set of parameters. They have the property that, asymptotically, finding collisions for a randomly chosen compression function implies

Set of Security Parameters for Cloud Computing Storage System

by Nikkita Prakash Jain
"... Storage-as-a-Service offered by cloud service suppliers (CSPs) could be a paid facility that permits organizations to source their sensitive information to be hold on remote servers. During this paper, we tend to propose a cloud-based storage theme permits} the info owner to learn from the facilitie ..."
Abstract - Add to MetaCart
Storage-as-a-Service offered by cloud service suppliers (CSPs) could be a paid facility that permits organizations to source their sensitive information to be hold on remote servers. During this paper, we tend to propose a cloud-based storage theme permits} the info owner to learn from the facilities offered by the CSP and enables indirect mutual trust between them. The planned theme has four vital features: (i) it permits the owner to source sensitive information to a CSP, and perform full block-level dynamic operations on the outsourced information, i.e., block modification, insertion, deletion, and append, (ii) it ensures that licensed users (i.e., those that have the proper to access the owner’s file) receive the most recent version of the outsourced information, (iii) it allows indirect mutual trust between the owner and also the CSP, and (iv) it permits the owner to grant or revoke access to the outsourced information. we tend to discuss the protection problems with the planned theme. Besides, we tend to justify its performance through theoretical analysis and a model implementation on Amazon cloud platform to judge storage, communication, and computation overheads. IndexTerm Outsourcing information storage, dynamic atmosphere, mutual trust, access management 1.

Management of VoWLAN Security Parameters using a QoS Tool

by Re Passito, Arlen Nascimento, Regeane Aguiar, Edjair Mota, Edson Nascimento, Ilias Biris, Eduardo Valentin
"... Abstract — Voice over IP is becoming an important application for wireless networks based in the IEEE 802.11 standard, but many problems must be addressed for the success of this combination, such as providing high number of connections with acceptable speech quality and minimal level of security. T ..."
Abstract - Add to MetaCart
the network operation to assist network nodes on selecting more accurate IPSec parameters to reduce the security impact on the real-time traffic. I.

Interdependent Security

by Geoffrey Heal, Mark Broadie, David Croson, Ido Erev, Victor Goldberg, Jay Hamilton, Jack Hershey, Daniel Kahneman, Erwann Michel-kerjan, Felix Oberholzer-gee, Yechiam Yemini, Participants In, Howard Kunreuther, Howard Kunreuther - Journal of Risk and Uncertainty , 2002
"... Do firms have adequate incentives to invest in protection against a risk whose magnitude depends in the actions of others? This paper characterizes the Nash equilibria for this type of interaction between agents, which we call the interdependent security (IDS) problem. When agents are identical, ..."
Abstract - Cited by 204 (33 self) - Add to MetaCart
Do firms have adequate incentives to invest in protection against a risk whose magnitude depends in the actions of others? This paper characterizes the Nash equilibria for this type of interaction between agents, which we call the interdependent security (IDS) problem. When agents are identical

Manish Kumar Aery et.al / Indian Journal of Computer Science and Engineering (IJCSE) Comparative study of security parameters by Cloud Providers

by Manish Kumar Aery, Sumit Gupta
"... Security is one of the major issues today around the world. Either it is a home user or Corporate User, a small PC or a Server System, nothing is totally secure, lots of issues have been raised regarding security. In this paper, we will be comparing the architectures of the Cloud Providers and how a ..."
Abstract - Add to MetaCart
and what Cloud Services they are providing. Here, we will also discuss about the different Security parameters offered by different Cloud Providers and will present the comparative study of security provided at different cloud services viz. Infrastructure as a Service, Platform as a Service and Software

Ó CBC – Cipher Block Chaining Ó CRC – Cyclic Redundancy Check Ó CSP – Critical Security Parameter

by unknown authors
"... Apricorn Aegis Secure Key (“Aegis Secure Key ” or “ASK”) is an encrypted storage device that provides organizations a secure way to store and transfer data. User authentication is self-contained via an on-board keypad. Stored data is secured by hardware-based 256-bit AES encryption to guard sensitiv ..."
Abstract - Add to MetaCart
Apricorn Aegis Secure Key (“Aegis Secure Key ” or “ASK”) is an encrypted storage device that provides organizations a secure way to store and transfer data. User authentication is self-contained via an on-board keypad. Stored data is secured by hardware-based 256-bit AES encryption to guard

How to Go Beyond the Black-Box Simulation Barrier

by Boaz Barak - In 42nd FOCS , 2001
"... The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary’s algorithm as a black-box. We present t ..."
Abstract - Cited by 228 (13 self) - Add to MetaCart
zeroknowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been

Cryptanalysis of block ciphers with overdefined systems of equations

by Nicolas T. Courtois, Josef Pieprzyk , 2002
"... Abstract. Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on proba ..."
Abstract - Cited by 253 (22 self) - Add to MetaCart
the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly

Pors: proofs of retrievability for large files

by Ari Juels, Burton S. Kaliski - In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security , 2007
"... Abstract. In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient fo ..."
Abstract - Cited by 254 (8 self) - Add to MetaCart
requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes. In a POR, unlike a POK, neither
Next 10 →
Results 1 - 10 of 4,448
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University