Concordia University

Displaying 1-40 of 69 results

  • White Papers // Oct 2013

    Integral Distinguishers for Reduced-Round Stribog

    In January 2013, the stribog hash function officially replaced GOST R 34.11-94 as the new Russian cryptographic hash standard GOST R 34.11-2012. Stribog is an AES-based primitive and is considered as an asymmetric reply to the new SHA-3 selected by NIST. In this paper the authors investigate the structural integral...

    Provided By Concordia University

  • White Papers // Sep 2013

    Explicit Authentication Response Considered Harmful

    Automated online password guessing attacks are facilitated by the fact that most user authentication techniques provide a yes/no answer as the result of an authentication attempt. These attacks are somewhat restricted by Automated Turing Tests (ATTs, e.g., captcha challenges) that attempt to mandate human assistance. ATTs are not very difficult...

    Provided By Concordia University

  • White Papers // Aug 2013

    Rebound Attacks on Stribog

    The researcher attacks on MD5 and SHA-1 followed by the SHA-3 competition have led to a flurry in the area of hash function cryptanalysis where different design concepts and various attack strategies were introduced. In August 2012, the stribog hash function was selected as the new Russian hash standard. Stribog...

    Provided By Concordia University

  • White Papers // Jun 2013

    A Substrate Description Framework and Semantic Repository for Publication and Discovery in Cloud-Based Conferencing

    In this paper, the authors proposed a substrate description framework and semantic repository architecture for cloud-based conferencing substrates. A proof-of-concept prototype was implemented, deployed, and successfully tested. The performance results for the proposed architecture delivers satisfactory results for publication and discovery of conference substrates. However, methods for further optimization need...

    Provided By Concordia University

  • White Papers // Jun 2013

    A Multi-Layer Architecture for Wireless Sensor Network Virtualization

    Wireless Sensor Networks (WSNs) have become pervasive and are used for a plethora of applications and services. They are usually deployed with specific applications and services; thereby precluding their re-use when other applications and services are contemplated. This can inevitably lead to the proliferation of redundant WSN deployments. Virtualization is...

    Provided By Concordia University

  • White Papers // Jun 2013

    A Heuristic for Finding Compatible Differential Paths with Application to HAS-160

    The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this paper, attacks typically proceed by starting from the middle and constructing the middle-steps quartet in which the two paths are enforced on the respective faces of the quartet structure....

    Provided By Concordia University

  • White Papers // Jun 2013

    Closed-Form Path-Loss Predictor for Gaussianly Distributed Nodes

    The emulation of wireless nodes spatial position is a practice used by deployment engineers and network planners to analyze the characteristics of a network. In particular, nodes geo-location will directly impact factors such as connectivity, signals fidelity, and service quality. In literature, in addition to typical homogenous scattering, normal distribution...

    Provided By Concordia University

  • White Papers // Dec 2012

    An Interactive Graph-Based Automation Assistant: A Case Study to Manage the GIPSY's Distributed Multi-Tier Run-Time System

    The GIPSY system provides a framework for a distributed multi-tier demand-driven evaluation of heterogeneous programs, in which certain tiers can generate demands, while others can respond to demands to work on them. They are connected through a virtual network that can be flexibly reconfigured at run-time. Although the demand generator...

    Provided By Concordia University

  • White Papers // Nov 2012

    Regularized Kernel Weighted Diffusion for 3D Shape Smoothing

    Recent advances in computer and information technology have increased the use of 3D models in many fields including medicine, the media, art and entertainment. The great challenge in image processing and computer graphics is to devise computationally efficient and optimal algorithms for recovering images and 3D models contaminated by noise...

    Provided By Concordia University

  • White Papers // Nov 2012

    Improving Service Availability in ERP Based Mesh Networks

    Ethernet Ring Protection (ERP) has recently emerged to provide protection switching for Ethernet ring topologies with sub-50 ms failover capabilities. In addition to Ethernet's cost-effectiveness and simplicity, ERP's promise to also provide protection in mesh packet transport networks positions Ethernet as a prominent competitor to conventional SONET/SDH and the technology...

    Provided By Concordia University

  • White Papers // Jun 2012

    Bandwidth Extension for Transimpedance Amplifiers

    In this paper, the author aims to introduce optical receivers in general and application of electronic circuits in these receivers then some important parts of these electronic circuits which are the amplifiers are discussed. An attempt has been made in this chapter to provide some useful information about different aspects...

    Provided By Concordia University

  • White Papers // Jun 2012

    Cryptanalysis of a Polynomial-Based Key Management Scheme for Secure Group Communication

    Piao et al. proposed a polynomial-based key management scheme for secure intra-group and inter-group communication. In this paper, the authors present a simple attack on this scheme and show that it does not satisfy group forward and backward secrecy. In other words, they show that when a node leaves a...

    Provided By Concordia University

  • White Papers // May 2012

    Throughput Analysis for IEEE 802.11 in Multi-Hop Wireless Networks

    IEEE 802.11 network uses the physical carrier sensing and RTS/CTS handshake as the main two techniques to combat interference and hidden node problem. But both techniques do not function well if the interferer or hidden node is beyond the transmission range of receivers. In the authors' model, they take this...

    Provided By Concordia University

  • White Papers // May 2012

    An Improved Hidden Markov Model for Anomaly Detection Using Frequent Common Patterns

    Host-based intrusion detection techniques are needed to ensure the safety and security of software systems, especially, if these systems handle sensitive data. Most host-based intrusion detection systems involve building some sort of reference models offline, usually from execution traces (in the absence of the source code), to characterize the system...

    Provided By Concordia University

  • White Papers // May 2012

    Path Vs. Cutset Approaches for the Design of Logical Survivable Topologies

    Multi-layer optical networks have recently evolved towards IP-over-WDM networks. Therein, in order to avoid protection/ restoration redundancies against either single or multiple failures, synergies need to be developed between IP and optical layers in order to reduce the costs and the energy consumption of the future IP-over-WDM networks. The authors...

    Provided By Concordia University

  • White Papers // May 2012

    A Cross Layer Optimization Scheme for WDM PON Network Design and Dimensioning

    The authors propose a novel cross layer optimization scheme for the design and dimensioning of green-field WDM PON networks. For a given geographical location of the OLT, the ONUs and their corresponding aggregated traffic demand, they propose a generic Integer Linear Programming (ILP) model which optimally and simultaneously: congregates the...

    Provided By Concordia University

  • White Papers // May 2012

    Combined Antenna Selection and Beamforming in Cross-Layer Design for Cognitive Networks

    The authors investigate the performance of an antenna selection algorithm applied with precoding to improve the throughput performance of cognitive Multiple-Input Multiple-Output (MIMO) radios. They assume cognitive MIMO radios coexist in the same frequency band with the primary users. In such event, for concurrent spectrum access, cognitive nodes use beamforming...

    Provided By Concordia University

  • White Papers // May 2012

    Joint Optimal Relay Selection and Power Allocation in Multicast Cooperative Networks

    The authors investigate the joint problem of relay selection and optimal sharing of relay power in wireless cellular networks with multicast traffic. They use two different performance metrics to maximize the network performance. They first present a mixed Boolean-convex optimization model to maximize the overall network capacity and solve this...

    Provided By Concordia University

  • White Papers // May 2012

    Boomerang and Slide-Rotational Analysis of the SM3 Hash Function

    SM3 is a hash function designed by Xiaoyun Wang et al., and published by the Chinese Commercial Cryptography Administration Office for the use of electronic authentication service system. The design of SM3 builds upon the design of the SHA-2 hash function, but introduces additional strengthening features. In this paper, using...

    Provided By Concordia University

  • White Papers // Apr 2012

    Selecting the Best Locations for Data Centers in Resilient Optical Grid/Cloud Dimensioning

    For optical grid/cloud scenarios, the dimensioning problem comprises not only deciding on the network dimensions (i.e., link bandwidths), but also choosing appropriate locations to install server infrastructure (i.e., data centers), as well as determining the amount of required server resources (for storage and/or processing). Given that users of such grid/cloud...

    Provided By Concordia University

  • White Papers // Mar 2012

    Reactive Relay Selection in Cooperative Spectrum-Sharing Systems

    The authors consider a dual-hop cooperative spectrum sharing system with multiple relays that are available to opportunistically help the secondary communication system. In this primary/secondary cooperative system, they propose using a Reactive Relay Selection (RRS) technique at the secondary system in which the best relay is chosen based on both...

    Provided By Concordia University

  • White Papers // Mar 2012

    Cloud Calculus: Security Verification in Elastic Cloud Computing Platform

    Cloud orchestration involves cloud resources scaling up and down, management, as well as manipulation to better respond user's requests and to facilitate operational objectives of the service providers. These promote the elastic nature of cloud platform but force upon significant challenges to cloud service providers. Particularly, security issues such as...

    Provided By Concordia University

  • White Papers // Jan 2012

    Mining Criminal Networks from Unstructured Text Documents

    Digital data collected for forensics analysis often contain valuable information about the suspects' social networks. However, most collected records are in the form of unstructured textual data, such as e-mails, chat messages, and text documents. An investigator often has to manually extract the useful information from the text and then...

    Provided By Concordia University

  • White Papers // Jan 2012

    Detection of Hardware Virtualization Based Rootkits by Performance Benchmarking

    In this paper, the authors describe an enhanced side-channel analysis method to detect hardware virtualization based rootkits, by detecting performance degradation caused by the hardware virtualization itself. The method proposed is, (like a network intrusion detection system), both passive and remote, so it is not easily detected by the rookit....

    Provided By Concordia University

  • White Papers // Jan 2012

    A Network Centric Infrastructure for Decision Support Based on Service Integration

    The importance of-fresh data is of paramount importance especially in missions involving safety/security critical context. The present infrastructure for service integration implements a one-time execution of a multi-task business process. Business process languages compose various services but the end-result corresponds to a static instance of the retrieved information. This modus...

    Provided By Concordia University

  • White Papers // Jan 2012

    Towards a Formal Semantics for AspectJ Weaving

    This paper describes a formal semantics of advice weaving in AspectJ. Since the version 1.1, AspectJ language is developed using bytecode weaving, which combines aspects and classes to produce .class les that run in a Java Virtual Machine (JVM). In AspectJ, the advice weaving is done statically by inserting the...

    Provided By Concordia University

  • White Papers // Jan 2012

    Formal Specification of Object-Oriented Design

    Software architectures and designs "Notations" are typically based on bubble-and-arc diagrams. Embellishing these diagrams may increase their information content but does not make a language. A formal language has syntax, semantics, and inference rules, so that reasoning and automatic manipulation are made possible. The authors describe LePUS, a formal language...

    Provided By Concordia University

  • White Papers // Sep 2011

    A First Look on the Effects and Mitigation of VoIP SPIT Flooding in 4G Mobile Networks

    The fourth generation of mobile networks is considered a technology-opportunistic and user-centric system. Part of its new architecture, 4G networks will implement an evolved packet core. Although this will provide various critical advantages, it will however expose telecom networks to serious IP-based attacks. One often adopted solution to mitigate such...

    Provided By Concordia University

  • White Papers // Apr 2011

    On Conditional Chase Termination

    The chase procedure was initially developed for testing logical implication between sets of dependencies, for determining equivalence of database instances known to satisfy a given set of dependencies, and for determining query equivalence under database constrains. More recently the chase has been used to compute representative target solutions in data...

    Provided By Concordia University

  • White Papers // Apr 2011

    A Unified Data Mining Solution for Authorship Analysis in Anonymous Textual Communications

    The cyber world provides an anonymous environment for criminals to conduct malicious activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often, these activities involve textual communication between a criminal and a victim, or between criminals themselves. The forensic analysis of online textual documents for addressing the anonymity...

    Provided By Concordia University

  • White Papers // Mar 2011

    Service-Oriented Architectures and Web Services: Course Tutorial Notes

    This paper presents a number of quick-step instructions to get started on writing mini-service-oriented web services-based applications using NetBeans 6.9.1, Tomcat 6, Glass-Fish 3.0.1, and Java 1.6 primarily in Scientific Linux 5.5 with user quota restrictions. While the tutorial notes are oriented towards the students taking the SOEN691A and SOEN487...

    Provided By Concordia University

  • White Papers // Mar 2011

    Multifaceted Faculty Network Design and Management: Practice and Experience Report

    The authors report on the experience on multidimensional aspects of the faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others. They outline a historical perspective on certain research, design, and development decisions and discuss the network...

    Provided By Concordia University

  • White Papers // Mar 2011

    Knowledge Management Systems Development: Theory and Practice

    The intricate crafting of online educational systems lie within three principal activities: design of the system, implementation, and proper post-implementation assessment. There is not enough knowledge or experience in all regards. Efficient execution of these three major activities necessitates the use of design and pedagogical models to achieve cost and...

    Provided By Concordia University

  • White Papers // Feb 2011

    Survivable Optical Grid Dimensioning: Anycast Routing With Server and Network Failure Protection

    Grids can efficiently deal with challenging computational and data processing tasks which cutting edge science is generating today. So-called e-Science grids cope with these complex tasks by deploying geographically distributed server infrastructure, interconnected by high speed networks. The latter benefit from optical technology, offering low latencies and high bandwidths, thus...

    Provided By Concordia University

  • White Papers // Feb 2011

    Performance of an Efficient Scheduling Approach to Network Coding for Wireless Local Repair

    The authors propose a new XOR based scheduling algorithm for network coding in cooperative local repair. The algorithm makes use of knowledge of the packets availability at neighboring nodes to improve the overall network throughput. In the proposed algorithm, they use network coding to determine which node should transmit and...

    Provided By Concordia University

  • White Papers // Dec 2010

    Automatic Modulation Recognition Using Wavelet Transform and Neural Networks in Wireless Systems

    Modulation type is one of the most important characteristics used in signal waveform identification. In this paper, an algorithm for automatic digital modulation recognition is proposed. The proposed algorithm is verified using Higher-Order statistical Moments (HOM) of Continuous Wavelet Transform (CWT) as features set. A multilayer feed-forward neural network trained...

    Provided By Concordia University

  • White Papers // Dec 2010

    Security Evaluation and Hardening of Free and Open Source Software (FOSS)

    Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term solution that deserves careful consideration because of its potential for significant cost savings, improved reliability, and numerous advantages over proprietary software. However, the secure integration of...

    Provided By Concordia University

  • White Papers // Sep 2010

    PEKSrand: Providing Predicate Privacy in Public-Key Encryption With Keyword Search

    Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, i.e., the property that t(x) reveals no information about the encoded predicate p, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, the authors propose two schemes. In the first scheme, they extend...

    Provided By Concordia University

  • White Papers // Sep 2010

    Insights From the Analysis of the Mariposa Botnet

    Nowadays, botnets are among the topmost network threats by combining innovative hacking capabilities. This is due to the fact that they are constantly improved by hackers to become more resilient against detection and debugging techniques. In this respect, the authors analyze one of the most prominent botnets, namely Mariposa, which...

    Provided By Concordia University

  • White Papers // Sep 2010

    Comparative Studies of 10 Programming Languages Within 10 Diverse Criteria

    There are many programming languages in the world today. Each language has their advantage and disadvantage. In this paper, the authors will discuss ten programming languages: C++, C#, Java, Groovy, JavaScript, PHP, Schalar, Scheme, Haskell and AspectJ. They summarize and compare these ten languages on ten different criterions. For example,...

    Provided By Concordia University