Skip to main content
The purpose behind this article is to describe the features of Ftklipse, an extendable platform for computer forensics. This document designed to provide a detailed specification for the developers of Ftklipse. Ftklipse is a thick-client... more
    • by 
    •   9  
      Software EngineeringComputer ForensicsOpen SourceCase Management
This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a... more
    • by 
    •   10  
      Computer ScienceData StructureProbability Distribution & ApplicationsIntrusion Detection
    • by 
    •   2  
      Internet ArchitectureSecure Computation
The emergence of cloud environments has made feasible the delivery of Internet-scale services by addressing a number of challenges such as live migration, fault tolerance and quality of service. However, current approaches do not tackle... more
    • by 
    •   11  
      Computer ScienceComputer ArchitectureCloud ComputingUser Generated Content
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential... more
    • by 
    •   24  
      EngineeringTechnologyComputer NetworksFPGA
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not... more
    • by 
    •   8  
      Quantum PhysicsInformation TheoryQuantum CryptographyQuantum Key Distribution
The goal of secure computation is for distrusted parties on a network to collaborate with each other without disclosing private information. In this paper, we focus on secure thresholding, or comparing two secret numbers, which is a key... more
    • by 
    •   19  
      Computer ScienceDistributed ComputingSignal ProcessingDistributed Algorithms
This paper further introduces and formalizes a novel concept of self-forensics for automotive vehicles, specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is... more
    • by 
    •   2  
      Automated reasoningSecure Computation
In the context of public key cryptography, the McEliece cryptosystem represents a very smart solution based on the hardness of the decoding problem, which is believed to be able to resist the advent of quantum computers. Despite this, the... more
    • by 
    •   5  
      Information TheorySystem DesignQuantum ComputerPublic key cryptography
This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on realworld link prediction, and the dataset was a graph obtained by crawling the... more
    • by 
    •   8  
      Machine LearningGraph TheorySimulated AnnealingScience Learning
    • by 
    • Secure Computation
Cybersecurity of the substations in a power system is a major issue as the substations become increasingly dependent on computer and communication networks. This paper is concerned with anomaly detection in the computer network... more
    • by  and +1
    •   14  
      Network SecurityPower SystemUser InterfaceAnomaly Detection
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Although some of its security problems... more
    • by 
    •   4  
      Next Generation Mobile NetworksInternet ArchitectureIT SecuritySecure Computation
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential... more
    • by 
    •   24  
      EngineeringTechnologyComputer NetworksFPGA
This chapter provides the overview of the state of the art in intrusion detection research. Intrusion detection systems are software and/or hardware components that monitor computer systems and analyze events occurring in them for signs... more
    • by 
    •   6  
      Data MiningComputer SecurityIntrusion DetectionInformation Sources
This paper presents a multi-tier model for secure computing as a teaching method platform. The security model is based on establishing the trustworthiness and role of each component in a distributed computing environment: trusted users,... more
    • by 
    •   6  
      Distributed ComputingSystem DesignTeaching MethodsSecure Computation
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such... more
    • by 
    •   5  
      Data StructureProbability Distribution & ApplicationsSecure ComputationBiometric Authentication
Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and... more
    • by 
    •   7  
      Distributed Data MiningSecure Multiparty ComputationExact ComputationSecure Computation
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The... more
    • by 
    •   12  
      CryptographyProtocolsGSMInternet Architecture
Code injection exploits a software vulnerability through which a malicious user can make an application run unauthorized code. Server applications frequently employ dynamic and domain-specific languages, which are used as vectors for the... more
    • by 
    •   10  
      Information SystemsInformation SecurityInternet SecurityData Security
The planetary models of ancient Indian mathematical astronomy are described in several texts. 1 These texts invariably give algorithms for computing mean and true longitudes of the planets, but are completely devoid of any material that... more
    • by 
    • Secure Computation
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to early cyber-risk insurance policies to current comprehensive... more
    • by 
    •   7  
      Information SecurityInternet SecurityAdverse SelectionMoral Hazard
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats,... more
    • by 
    •   8  
      Distributed ComputingSoftware EngineeringNetwork SecurityCloud Computing
Experimental research in dependability has evolved over the past 30 years accompanied by dramatic changes in the computing industry. To understand the magnitude and nature of this evolution, this paper analyzes industrial trends, namely:... more
    • by 
    •   6  
      Distributed ComputingExperimental ResearchComputer SoftwareSecure Computation
This paper gives an online algorithm for generating Jakobsson's fractal hash chains . Our new algorithm compliments Jakobsson's fractal hash chain algorithm for preimage traversal since his algorithm assumes the entire hash chain is... more
    • by 
    •   3  
      Digital ForensicsData StructureSecure Computation
This paper describes the synthesis of matrices with good correlation, from cyclic shifts of pseudonoise columns. Optimum matrices result whenever the shift sequence satisfies the constant difference property. Known shift sequences with... more
    • by  and +1
    •   8  
      Information TheoryWatermarkingDiscrete MathematicsCross Correlation
Significant developments have taken place over the past few years in the area of vehicular communication (VC) systems. Now, it is well understood in the community that security and protection of private user information are a prerequisite... more
    • by 
    •   14  
      Distributed ComputingPrivacyCryptographySecurity and Privacy
Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on... more
    • by 
    •   6  
      SecuritySecure Multiparty ComputationPrivate Set IntersectionSecure Computation
    • by 
    •   2  
      Internet ArchitectureSecure Computation
In this paper, a newer version of Walsh-Hadamard quality and the smallest singular values are more sensitive Transform namely multiresolution Walsh-Hadamard Transform to the noise. Here the middle singular values are selected (MR-WHT) is... more
    • by 
    •   6  
      Information TheoryHigh FrequencySingular value decompositionSecure Computation
    • by 
    • Secure Computation
This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for... more
    • by 
    •   14  
      Distributed ComputingSoftware ReliabilityFault ToleranceDependability
Security and information systems are intertwined. The costs of secure systems are in the billions of dollars. In the digital world, security vulnerabilities and threats work contrary to the security goals of confidentiality, integrity,... more
    • by 
    •   8  
      Information SystemsSocial WorkInformation SecurityOPERATING SYSTEM
This paper introduces the notion of a secure data capsule, which refers to an encapsulation of sensitive user information (such as a credit card number) along with code that implements an interface suitable for the use of such information... more
    • by 
    •   6  
      Virtual Machine MonitorData AccessWeb ServiceTrusted Platform Module
The Alternating Step(r, s) Generator, ASG(r, s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the... more
    • by 
    •   4  
      Information TheoryComputational ComplexitySecure ComputationAlgebraic Attack
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been tackled only recently. In order to show the feasibility of secure VC,... more
    • by 
    •   9  
      Distributed ComputingSecurity and PrivacyInternet ArchitectureVehicular Communication
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is... more
    • by 
    •   3  
      Secure ComputationProgramming languagePartial Order
There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of... more
    • by 
    •   9  
      Distributed ComputingDigital SignatureComputer SecurityComputer Network
We provide formal definitions and efficient secure techniques for
    • by 
    •   8  
      Information TheoryPure MathematicsPublic InformationSynchronicity
Using our non-malleable extractor, we obtain protocols for "privacy amplification": key agreement between two parties who share a weakly-random secret. Our protocols work in the presence of an active adversary with unlimited computational... more
    • by 
    •   10  
      Number TheoryComputational ComplexityCryptographyPure Mathematics
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having... more
    • by 
    •   2  
      Computational ComplexitySecure Computation
Awareness of the need for secure systems has grown rapidly as computers have become increasingly pervasive in our society. Numerous computer security technologies have been proposed and implemented, but all of them fall short of providing... more
    • by 
    •   7  
      Computer ScienceComputer SecurityCommunication SystemInformation Systems Management
    • by 
    •   5  
      Distributed ComputingPublic Key InfrastructureComputer CommunicationsSecure Computation
Nowadays, there is a huge variety of cyber threats that can be quite dangerous not only for big companies but also for an ordinary user, who can be a potential victim for cybercriminals when using unsafe system for entering confidential... more
    • by 
    •   5  
      Computer ScienceInformation SecurityInformation TheoryInternet Architecture
Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computation preserves the privacy of input data using cryptographic protocols,... more
    • by 
    •   10  
      Fixed Point TheoryData SharingSecure Multiparty ComputationApplication development
Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitive and important information stored in the cloud for users. Users are wondering about attacks on the integrity and the... more
    • by 
    •   6  
      Cloud ComputingData SecurityData IntegrityData Model
Effective use of existing network and IT infrastructure can be achieved by providing combined network and IT resources on-demand as infrastructure services that are capable of supporting complex technological processes, scientific... more
    • by 
    •   15  
      Computer ArchitectureDistributed DatabaseService Oriented ArchitectureCloud Computing
We present an application of Artificial Intelligence techniques to the field of Information Security. The problem of remote Operating System (OS) Detection, also called OS Fingerprinting, is a crucial step of the penetration testing... more
    • by 
    •   8  
      Information SecurityNeural NetworkOPERATING SYSTEMArtificial Intelligent
    • by  and +1
    •   5  
      X-ray imagingX RaysComputer Based TrainingOn the Job Training
Open source software presents new opportunities for software acquisition but comes with the risk of introducing vulnerabilities. SAVI combines several types of static-analysis data to rank application vulnerability.
    • by 
    •   8  
      Software EngineeringStatic AnalysisComputer SecurityEmpirical Software Engineering