E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 621.382 |
Collana | Communications in computer and information science |
Soggetto topico | Telecommunication systems |
ISBN | 3-030-90428-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 Building Blocks -- 3.1 Bit-Masking -- 3.2 Acquiring White Traffic -- 3.3 Matching Algorithm -- 4 Methodology -- 5 Attack Implementations -- 5.1 Improved Version 1 -- 5.2 Improved Version 2 -- 6 Experiments and Results -- 6.1 Performance Tests -- 6.2 Attack Evasion Tests -- 7 Conclusion -- References -- Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes -- 1 Introduction -- 2 A New Non-linear Convolutional Encoding/Decoding Algorithm -- 2.1 Non-linear Convolutional Cryptosystem -- 2.2 New Encoding/Decoding Algorithm Using Non-linear Convolutional Code -- 3 A New Variant of the Mceliece Cryptosystem -- 3.1 The Classical McEliece Cryptosystem -- 3.2 The New Variant of the McEliece Cryptosystem [14] -- 4 Cryptographic Algorithm Metrics -- 4.1 Key Size Analysis -- 4.2 Complexity Analysis -- 5 Cryptanalysis -- 5.1 Structural Attack [14] -- 5.2 Decoding Attack [14] -- 6 Results and Discussion -- 6.1 Structural Attack -- 6.2 Decoding Attack -- 6.3 Comparison with Existing McEliece Cryptosystems -- 7 Conclusion -- Appendix -- Transition Tables -- References -- A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 Distributed Cipher Block Chaining: DCBC -- 3.2 Target Criteria -- 3.3 How Does DCBC Work? -- 3.4 Encryption and Decryption in DCBC -- 3.5 IV Generator -- 4 Security Properties -- 4.1 CPA Security -- 4.2 Blockwise Adaptive Chosen Plaintext Attack Security -- 5 Theoretical Performance Cost -- 5.1 Assumptions -- 5.2 Cost Function C -- 5.3 Theoretical Performance Comparison.
6 Theoretical Diffusion -- 6.1 The Probability of a Bit Flipping -- 6.2 Probability of at Least M Bits Flipping -- 7 Conclusion and Future Work -- References -- An Assurance Framework and Process for Hybrid Systems -- 1 Introduction -- 2 Assurance Requirements -- 3 Assurance Framework -- 4 REST Interface -- 4.1 OpenAPI Document -- 4.2 Component REST API -- 5 Assurance Process -- 5.1 Building Blocks -- 5.2 Assurance Process -- 6 Walkthrough and Experiments -- 6.1 Process in Execution -- 6.2 Experiments -- 7 Comparison with Existing Solutions -- 8 Conclusions -- References -- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions and Structure -- 1.3 Related Work -- 2 Framework and Preliminaries -- 3 Pitfalls in Out-of-Band Authentication -- 3.1 Inattentive Users and Partial Preimage Attacks -- 3.2 Case Study -- 4 Authentication in Secure Email and Messaging via PAKE -- 4.1 Public Key Authentication via PAKE -- 4.2 An Instantiation Based on SPAKE2 -- 4.3 Selecting a PAKE Protocol -- 4.4 Transport Mechanism -- 5 Enhancements to Secure Email and Messaging by PAKE -- 5.1 Key Management and Authentication Improvements -- 5.2 Cryptographic Properties Enabled by PAKE -- 5.3 Cryptographic Enhancements to Email and Messaging -- 5.4 Comparison -- 6 Implementation: PakeMail -- 6.1 Cryptographic Details -- 6.2 PAKE Protocol Carried Out over Email -- 6.3 Implemented Scenarios -- 6.4 Performance -- 6.5 Further Design and Security Considerations -- 7 Security and Low-Entropy Secrets -- 8 Further Directions -- References -- Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures -- 1 Introduction -- 2 Preliminaries -- 3 Our Contribution -- 3.1 Motivation and Main Goal -- 3.2 Our Scheme for CASs. 3.3 Variations on the Same Theme: The Case of MASs -- 4 Extension to Multiple-Input Boolean Trees -- 5 Implementation -- 6 Conclusions -- References -- Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems -- 1 Introduction -- 2 Notation and Background -- 3 In-Place Randomized Bit-Flipping Decoder -- 3.1 An In-Place, Randomized Bit-Flipping Decoder -- 3.2 Modeling of the Bit-Flipping Probabilities -- 4 Validation of DFR Models and Cryptosystem Design -- 4.1 Experimental Validation of DFR Models -- 4.2 Design of Code-Based Cryptosystems -- 5 Related Work and Discussion -- 6 Conclusion -- References -- Business Analyst Tasks for Requirement Elicitation -- 1 Introduction -- 2 Systematic Literature Review -- 3 Business Analyst for Agile Method Driven Requirement Elicitation -- 4 Business Analyst in Ontology Driven Requirement Engineering -- 5 Case Study on Non-formal Education System Development -- 6 Conclusions -- References -- Chained Transaction Protocol Automated Verification Using Cl-AtSe -- 1 Introduction -- 2 Chained Transaction Protocol -- 2.1 Exchange Sub-protocol -- 2.2 Resolution 1 Sub-protocol -- 2.3 Resolution 2 Sub-protocol -- 3 Overview of AVISPA Tool -- 3.1 AVISPA Tool -- 3.2 High Level Protocol Specification Language -- 4 Automated Verification of Chained Transaction Protocol -- 4.1 Agent's Basic Roles -- 4.2 Protocol's Sessions Composed Roles -- 4.3 Environment Role -- 4.4 Security Requirements -- 4.5 Verification Results -- 5 Conclusions -- References -- Overall Feasibility of RF Energy Harvesting for IoT -- 1 Introduction -- 2 Constraints -- 2.1 Ambient Energy -- 2.2 Energy Consumption -- 3 Choice of Storage Capacitor -- 4 Rectifier -- 5 Overall System Feasibility -- 5.1 Theoretical Model -- 5.2 Application of the Model -- 6 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910508446903321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
E-business and telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, online event, July 8-10, 2020 : revised selected papers / / Mohammad S. Obaidat, Jalel Ben-Othman (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (243 pages) |
Disciplina | 621.382 |
Collana | Communications in computer and information science |
Soggetto topico | Telecommunication systems |
ISBN | 3-030-90428-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 Building Blocks -- 3.1 Bit-Masking -- 3.2 Acquiring White Traffic -- 3.3 Matching Algorithm -- 4 Methodology -- 5 Attack Implementations -- 5.1 Improved Version 1 -- 5.2 Improved Version 2 -- 6 Experiments and Results -- 6.1 Performance Tests -- 6.2 Attack Evasion Tests -- 7 Conclusion -- References -- Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional Codes -- 1 Introduction -- 2 A New Non-linear Convolutional Encoding/Decoding Algorithm -- 2.1 Non-linear Convolutional Cryptosystem -- 2.2 New Encoding/Decoding Algorithm Using Non-linear Convolutional Code -- 3 A New Variant of the Mceliece Cryptosystem -- 3.1 The Classical McEliece Cryptosystem -- 3.2 The New Variant of the McEliece Cryptosystem [14] -- 4 Cryptographic Algorithm Metrics -- 4.1 Key Size Analysis -- 4.2 Complexity Analysis -- 5 Cryptanalysis -- 5.1 Structural Attack [14] -- 5.2 Decoding Attack [14] -- 6 Results and Discussion -- 6.1 Structural Attack -- 6.2 Decoding Attack -- 6.3 Comparison with Existing McEliece Cryptosystems -- 7 Conclusion -- Appendix -- Transition Tables -- References -- A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 Distributed Cipher Block Chaining: DCBC -- 3.2 Target Criteria -- 3.3 How Does DCBC Work? -- 3.4 Encryption and Decryption in DCBC -- 3.5 IV Generator -- 4 Security Properties -- 4.1 CPA Security -- 4.2 Blockwise Adaptive Chosen Plaintext Attack Security -- 5 Theoretical Performance Cost -- 5.1 Assumptions -- 5.2 Cost Function C -- 5.3 Theoretical Performance Comparison.
6 Theoretical Diffusion -- 6.1 The Probability of a Bit Flipping -- 6.2 Probability of at Least M Bits Flipping -- 7 Conclusion and Future Work -- References -- An Assurance Framework and Process for Hybrid Systems -- 1 Introduction -- 2 Assurance Requirements -- 3 Assurance Framework -- 4 REST Interface -- 4.1 OpenAPI Document -- 4.2 Component REST API -- 5 Assurance Process -- 5.1 Building Blocks -- 5.2 Assurance Process -- 6 Walkthrough and Experiments -- 6.1 Process in Execution -- 6.2 Experiments -- 7 Comparison with Existing Solutions -- 8 Conclusions -- References -- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions and Structure -- 1.3 Related Work -- 2 Framework and Preliminaries -- 3 Pitfalls in Out-of-Band Authentication -- 3.1 Inattentive Users and Partial Preimage Attacks -- 3.2 Case Study -- 4 Authentication in Secure Email and Messaging via PAKE -- 4.1 Public Key Authentication via PAKE -- 4.2 An Instantiation Based on SPAKE2 -- 4.3 Selecting a PAKE Protocol -- 4.4 Transport Mechanism -- 5 Enhancements to Secure Email and Messaging by PAKE -- 5.1 Key Management and Authentication Improvements -- 5.2 Cryptographic Properties Enabled by PAKE -- 5.3 Cryptographic Enhancements to Email and Messaging -- 5.4 Comparison -- 6 Implementation: PakeMail -- 6.1 Cryptographic Details -- 6.2 PAKE Protocol Carried Out over Email -- 6.3 Implemented Scenarios -- 6.4 Performance -- 6.5 Further Design and Security Considerations -- 7 Security and Low-Entropy Secrets -- 8 Further Directions -- References -- Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures -- 1 Introduction -- 2 Preliminaries -- 3 Our Contribution -- 3.1 Motivation and Main Goal -- 3.2 Our Scheme for CASs. 3.3 Variations on the Same Theme: The Case of MASs -- 4 Extension to Multiple-Input Boolean Trees -- 5 Implementation -- 6 Conclusions -- References -- Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based Cryptosystems -- 1 Introduction -- 2 Notation and Background -- 3 In-Place Randomized Bit-Flipping Decoder -- 3.1 An In-Place, Randomized Bit-Flipping Decoder -- 3.2 Modeling of the Bit-Flipping Probabilities -- 4 Validation of DFR Models and Cryptosystem Design -- 4.1 Experimental Validation of DFR Models -- 4.2 Design of Code-Based Cryptosystems -- 5 Related Work and Discussion -- 6 Conclusion -- References -- Business Analyst Tasks for Requirement Elicitation -- 1 Introduction -- 2 Systematic Literature Review -- 3 Business Analyst for Agile Method Driven Requirement Elicitation -- 4 Business Analyst in Ontology Driven Requirement Engineering -- 5 Case Study on Non-formal Education System Development -- 6 Conclusions -- References -- Chained Transaction Protocol Automated Verification Using Cl-AtSe -- 1 Introduction -- 2 Chained Transaction Protocol -- 2.1 Exchange Sub-protocol -- 2.2 Resolution 1 Sub-protocol -- 2.3 Resolution 2 Sub-protocol -- 3 Overview of AVISPA Tool -- 3.1 AVISPA Tool -- 3.2 High Level Protocol Specification Language -- 4 Automated Verification of Chained Transaction Protocol -- 4.1 Agent's Basic Roles -- 4.2 Protocol's Sessions Composed Roles -- 4.3 Environment Role -- 4.4 Security Requirements -- 4.5 Verification Results -- 5 Conclusions -- References -- Overall Feasibility of RF Energy Harvesting for IoT -- 1 Introduction -- 2 Constraints -- 2.1 Ambient Energy -- 2.2 Energy Consumption -- 3 Choice of Storage Capacitor -- 4 Rectifier -- 5 Overall System Feasibility -- 5.1 Theoretical Model -- 5.2 Application of the Model -- 6 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996464404803316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Q2SWinet '10 : proceedings of the sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks, October 20-21, 2010, Bodrum, Turkey |
Autore | Gerla Mario |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2010 |
Descrizione fisica | 1 online resource (110 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks
MSWiM '10 the 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Bodrum, Turkey - October 17 - 21, 2010 |
Record Nr. | UNINA-9910376011603321 |
Gerla Mario | ||
[Place of publication not identified], : ACM, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Q2SWinet'11 : proceedings of the seventh ACM Symposium on QoS and Security for Wireless and Mobile Networks, October 31November 4, 2011, Miami, Florida, USA |
Autore | Chen Hsiao-Hwa |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2011 |
Descrizione fisica | 1 online resource (72 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
ISBN | 1-4503-0899-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Q2SWinet'11 : proceedings of the seventh Association for Computing Machinery Symposium on QoS and Security for Wireless and Mobile Networks, October 31November 4, 2011, Miami, Florida, United States of America
Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks MSWiM '11 the 14th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, USA-October 31-November 04, 2011 |
Record Nr. | UNINA-9910376126103321 |
Chen Hsiao-Hwa | ||
[Place of publication not identified], : ACM, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|