Cornell University

Displaying 1001-1040 of 1111 results

  • White Papers // Jun 2009

    A New Approach to Manage QoS in Distributed Multimedia Systems

    Dealing with network congestion is a criterion used to enhance Quality of Service (QoS) in distributed multimedia systems. The existing solutions for the problem of network congestion ignore scalability considerations because they maintain a separate classification for each video stream. In this paper, the authors propose a new method allowing...

    Provided By Cornell University

  • White Papers // Jun 2009

    On the Statistical Characterization of Flows in Internet Traffic With Application to Sampling

    A new method of estimating some statistical characteristics of TCP flows in the Internet is developed in this paper. For this purpose, a new set of random variables (referred to as observables) is defined. When dealing with sampled traffic, these observables can easily be computed from sampled data. By adopting...

    Provided By Cornell University

  • White Papers // Jun 2009

    Processing of Medical Signals (ECG) in Wireless Sensor Networks

    Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...

    Provided By Cornell University

  • White Papers // Jun 2009

    Adaptive Algorithms for the Identification of Large Flows in IP Traffic

    The authors propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the...

    Provided By Cornell University

  • White Papers // Jun 2009

    Efficient Offline Algorithmic Techniques for Several Packet Routing Problems in Distributed Systems

    The development of distributed systems worldwide follows a steeper and steeper ascending trend, as such systems become natural solutions to many real-life problems. Communication (at a lower level) and collaboration (at a higher level) are two key elements of a distributed system. At the lowest level, packet routing techniques are...

    Provided By Cornell University

  • White Papers // Jun 2009

    Equalization for Non-Coherent UWB Systems With Approximate Semi-Definite Programming

    In this paper, the authors propose an approximate semi-definite programming framework for demodulation and equalization of non-coherent ultra-wide-band communication systems with inter-symbol-interference. It is assumed that the communication systems follow non-linear second-order Volterra models. They formulate the demodulation and equalization problems as semi-definite programming problems. They propose an approximate algorithm...

    Provided By Cornell University

  • White Papers // Jun 2009

    Observed Universality of Phase Transitions in High-Dimensional Geometry, With Implications for Modern Data Analysis and Signal Processing

    The authors review connections between phase transitions in high-dimensional combinatorial geometry and phase transitions occurring in modern high-dimensional data analysis and signal processing. In data analysis, such transitions arise as abrupt breakdown of linear model selection, robust data fitting or compressed sensing reconstructions, when the complexity of the model or...

    Provided By Cornell University

  • White Papers // Jun 2009

    Evading Network-Level Emulation

    Recently more and more attention has been paid to the Intrusion Detection Systems (IDS) which don't rely on signature based detection approach. Such solutions try to increase their defense level by using heuristics detection methods like network-level emulation. This technique allows the intrusion detection systems to stop unknown threats, which...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // Jun 2009

    Optimal Constrained Resource Allocation Strategies Under Low Risk Circumstances

    In this paper, the authors consider multiple constrained resource allocation problems, where the constraints can be specified by formulating activity dependency restrictions or by using game-theoretic models. All the problems are focused on generic resources, with a few exceptions which consider financial resources in particular. The problems consider low-risk circumstances...

    Provided By Cornell University

  • White Papers // Jun 2009

    Using the Keystrokes Dynamic for Systems of Personal Security

    This paper presents a boarding on biometric authentication through the Keystrokes Dynamics that it intends to identify a person from its habitual rhythm to type in conventional keyboard. Seven done experiments: Verifying amount of prototypes, threshold, features and the variation of the choice of the times of the features vector....

    Provided By Cornell University

  • White Papers // Jun 2009

    Division Algebras and Wireless Communication

    The aim of this note is to bring to the attention of a wide mathematical audience the recent application of division algebras to wireless communication. The application occurs in the context of communication involving multiple transmit and receive antennas, a context known in engineering as MIMO, short for multiple input,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Is Unlevered Firm Volatility Asymmetric?

    Asymmetric volatility refers to the stylized fact that stock volatility is negatively correlated to stock returns. Traditionally, this phenomenon has been explained by the financial leverage effect. This explanation has recently been challenged in favor of a risk premium based explanation. The authors develop a new, unlevering approach to document...

    Provided By Cornell University

  • White Papers // May 2009

    About Raising and Handling Exceptions

    This paper presents a unified framework for dealing with a deduction system and a denotational semantics of exceptions. It is based on the fact that handling exceptions can be seen as a kind of generalized case distinction. This point of view on exceptions has been introduced in 2004, it is...

    Provided By Cornell University

  • White Papers // May 2009

    Unleash Stranded Power in Data Centers with RackPacker

    Data center infrastructures are highly underutilized on average. Typically, a data center manager computes the number of servers his facility can host by dividing the total power capacity of each rack by an assigned "Peak Power Rating" for each server. However, this scheme suffers from the weakness of all static...

    Provided By Cornell University

  • White Papers // May 2009

    Multicasting in Large Wireless Networks: Bounds on the Minimum Energy Per Bit

    The authors consider scaling laws for maximal energy efficiency of communicating a message to all the nodes in a wireless network, as the number of nodes in the network becomes large. Two cases of large wireless networks are studied dense random networks and constant density (extended) random networks. In addition,...

    Provided By Cornell University

  • White Papers // May 2009

    Reasoning About Soft Constraints and Conditional Preferences: Complexity Results and Approximation Techniques

    Many real life optimization problems contain both hard and soft constraints, as well as qualitative conditional preferences. However, there is no single formalism to specify all three kinds of information. The authors therefore propose a framework, based on both CP-nets and soft constraints, that handles both hard and soft constraints...

    Provided By Cornell University

  • White Papers // May 2009

    Sharing Private Information Across Distributed Databases

    In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. The authors show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any...

    Provided By Cornell University

  • White Papers // May 2009

    Cryptography for Multi-Located Parties

    This note is to describe issues and problems related to cryptography for a network of distributed, multi-located parties. Given that many business and government entities have secure links between their own geographically distributed computers, multi-location is already a fact for many users. Multi-located parties can address the problem of man-in-the-middle...

    Provided By Cornell University

  • White Papers // May 2009

    Towards a Centralized Scheduling Framework for Communication Flows in Distributed Systems

    The overall performance of a distributed system is highly dependent on the communication efficiency of the system. Although network resources (links, bandwidth) are becoming increasingly more available, the communication performance of data transfers involving large volumes of data does not necessarily improve at the same rate. This is due to...

    Provided By Cornell University

  • White Papers // May 2009

    Optimization of Energy Efficient Transmission in Underwater Sensor Networks

    Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless communication cannot be directly applied in the underwater world. In this paper, the authors focus on the issue of energy efficient transmission in Under-Water Sensor Networks (UWSNs) and analyze this problem in...

    Provided By Cornell University

  • White Papers // May 2009

    A Large-Deviation Analysis for the Maximum Likelihood Learning of Tree Structures

    The problem of maximum-likelihood learning of the structure of an unknown discrete distribution from samples is considered when the distribution is Markov on a tree. Large-deviation analysis of the error in estimation of the set of edges of the tree is performed. Necessary and sufficient conditions are provided to ensure...

    Provided By Cornell University

  • White Papers // Apr 2009

    Tight Enforcement of Information-Release Policies for Dynamic Languages

    This paper studies the problem of securing information release in dynamic languages. The authors propose an intuitive framework for information-release policies expressing both what can be released by an application and where in the code this release may take place and tight and modular enforcement by hybrid mechanisms that combine...

    Provided By Cornell University

  • White Papers // Apr 2009

    Internet Traffic Periodicities and Oscillations: A Brief Review

    Internet traffic has exploded in the last fifteen years as an area of intense theoretical and experimental research. As the largest engineered infrastructure and information system in human history, the Internet's staggering size and complexity are reinforced by its decentralized and self-organizing structure. Using packets of encapsulated data and a...

    Provided By Cornell University

  • White Papers // Apr 2009

    HONEI: A Collection of Libraries for Numerical Computations Targeting Multiple Processor Architectures

    The authors present HONEI, an open-source collection of libraries o ering a hardware oriented approach to numerical calculations. HONEI paper the hardware, and applications written on top of HONEI can be executed on a wide range of computer architectures such as CPUs, GPUs and the Cell processor. They demonstrate the...

    Provided By Cornell University

  • White Papers // Apr 2009

    Denial of Service Attack in the Internet: Agent-Based Intrusion Detection and Reaction

    In the past most of the attacks targeted a single system, in an attempt to disable it or to gain an unauthorized access to the data in the system. Today, the most dangerous threats no longer attack hosts, but rather the network infrastructure: Worms and Distributed Denial of Service (DDOS)...

    Provided By Cornell University

  • White Papers // Apr 2009

    VRAC: Virtual Raw Anchor Coordinates Routing in Sensor Networks - Concepts and Experimental Protocol

    In order to make full use of geographic routing techniques developed for large scale networks, nodes must be localized. However, localization and virtual localization techniques in sensor networks are dependent either on expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated localization calculus (e.g. triangulation) which are both error-prone...

    Provided By Cornell University

  • White Papers // Apr 2009

    Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme

    Shamir in 1985 introduced the concept of IDentity(ID) based cryptosystems where, a users public key is derived from his identity and the corresponding private key is generated by a trusted third party called the Private Key Generator (PKG). ID based cryptosystems are advantageous over the traditional Public Key Cryptosystems (PKC)...

    Provided By Cornell University

  • White Papers // Apr 2009

    Some Proxy Signature and Designated Verifier Signature Schemes Over Braid Groups

    Braid groups have recently attracted the attention of many cryptographers. These highly non-commutative groups are useful to construct cryptosystems. They provide numerous mathematical hard problems such as the conjugacy search problem, braid decomposition problem and root problem. Moreover, the group operation and generation of the parameters can be implemented quite...

    Provided By Cornell University

  • White Papers // Apr 2009

    Online Reinforcement Learning for Dynamic Multimedia Systems

    In the previous work, the authors proposed a systematic cross-layer framework for dynamic multimedia systems, which allows each layer to make autonomous and foresighted decisions that maximize the system's long-term performance, while meeting the application's real-time delay constraints. The proposed solution solved the cross-layer optimization offline, under the assumption that...

    Provided By Cornell University

  • White Papers // Apr 2009

    WS-OBJECTS: Extending Service-Oriented Architecture With Hierarchical Composition of Client-Side Asynchronous Event-Processing Logic

    There is a growing need for a new type of WS/SOA standards that could facilitate hierarchical, object-oriented composition of client-side executable code. This is especially true for the sorts of client-side logic embedded in AJAX and rich Internet applications, virtual worlds and MMORPGs; code that deals with issuing requests to...

    Provided By Cornell University

  • White Papers // Apr 2009

    Building Collaboration Applications That Mix Web Services Hosted Content With P2P Protocols

    The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. This paper makes the case for Service-Oriented Collaboration applications that combine service-hosted data with collaboration features implemented using peer-to-peer protocols. Collaboration features are awkward to support solely based on...

    Provided By Cornell University

  • White Papers // Apr 2009

    Geodesic Paths on 3D Surfaces: Survey and Open Problems

    Finding shortest paths and shortest distances between points on a surface S in three-dimensional space is a well-studied problem in differential geometry and computational geometry. The shortest path between two points on S is denoted a geodesic path on the surface and the shortest distance between two points on S...

    Provided By Cornell University

  • White Papers // Apr 2009

    A Fundamental Characterization of Stability in Broadcast Queueing Systems

    Stability with respect to a given scheduling policy has become an important issue for wireless communication systems, but it is hard to prove in particular scenarios. In this paper two simple conditions for stability in broadcast channels are derived, which are easy to check. Heuristically, the conditions imply that if...

    Provided By Cornell University

  • White Papers // Apr 2009

    National Security Review Of Foreign Mergers And Acquisitions Of Domestic Companies In China And The United States

    China's recently enacted Anti-Monopoly Law has received much academic attention. In particular, many articles and comments have been written about the Anti-Monopoly Law, a provision on national security review of foreign mergers and acquisitions of domestic companies. The provision has often been labelled as draconian and protectionist. This paper argues...

    Provided By Cornell University

  • White Papers // Apr 2009

    Lattice Strategies for the Dirty Multiple Access Channel

    A generalization of the Gaussian dirty-paper problem to a multiple access setup is considered. There are two additive interference signals, one known to each transmitter but none to the receiver. The rates achievable using Costa's strategies (i.e. by a random binning scheme induced by Costa's auxiliary random variables) vanish in...

    Provided By Cornell University

  • White Papers // Apr 2009

    Simplicial Databases

    In this paper, the authors define a category DB, called the category of simplicial databases, whose objects are databases and whose morphisms are data-preserving maps. Along the way they give a precise formulation of the category of relational databases, and prove that it is a full subcategory of DB. They...

    Provided By Cornell University

  • White Papers // Apr 2009

    Towards a Cloud Computing Research Agenda

    The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while...

    Provided By Cornell University

  • White Papers // Apr 2009

    On Formal Verification of Arithmetic-Based Cryptographic Primitives

    Cryptographic primitives are fundamental for information security: They are used as basic components for cryptographic protocols or public-key cryptosystems. In many cases, their security proofs consist in showing that they are reducible to computationally hard problems. Those reductions can be subtle and tedious, and thus not easily checkable. On top...

    Provided By Cornell University

  • White Papers // Apr 2009

    A New Key-Agreement-Protocol

    A new 4-pass Key-Agreement-Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-time computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations. At the end of a Key-Agreement-Protocol two parties, say Alice and Bob, share a common bit string...

    Provided By Cornell University

  • White Papers // Aug 2011

    SLALOM: A Language for SLA Specification and Monitoring

    IT services provisioning is usually underpinned by Service Level Agreements (SLAs), aimed at guaranteeing services quality. However, there is a gap between the customer perspective (business oriented) and that of the service provider (implementation oriented) that becomes more evident while defining and monitoring SLAs. This paper proposes a domain specific...

    Provided By Cornell University

  • White Papers // May 2013

    Endow a Service-Oriented Architecture by a Decisional Aspect

    SOA architecture is more and more used in the companies, The importance of the service orientation and its advantages with the information system of the company, confront one to a new challenge. It is primarily to ensure the decisional aspect of the information system of company by adopting Ser-vices Orientated...

    Provided By Cornell University

  • White Papers // Nov 2012

    A Tale Of 160 Scientists, Three Applications, A Workshop and A Cloud

    One of the applications, PyKE, is a suite of Python tools designed to reduce and analyze Kepler light curves; these tools can be invoked from the Unix command line or a GUI in PyRAF. The Transit Analysis Package (TAP) uses Markov Chain Monte Carlo (MCMC) techniques to fit light curves...

    Provided By Cornell University

  • White Papers // Aug 2013

    On Optimal and Fair Service Allocation in Mobile Cloud Computing

    In this paper the authors study the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. They exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Secure Authentication of Cloud Data Mining API

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy...

    Provided By Cornell University

  • White Papers // Feb 2014

    Hardware Generation Languages as a Foundation for Credible, Reproducible, and Productive Research Methodologies

    Cycle-Approximate Simulators (CAS) have long been a staple in the experimental toolkit of computer architecture researchers. However, recent technology trends have triggered a growing emphasis on specialization and heterogeneity, bringing into question the viability of a purely CAS-based methodology. In this paper, the authors argue computer architects should consider adopting...

    Provided By Cornell University

  • White Papers // Jan 2013

    Why Quantum Computing Is Hard - and Quantum Cryptography Is Not Provably Secure

    Despite high hopes for quantum computation in the 1990s, progress in the past decade has been slow; the people still cannot perform computation with more than about three qubits and are no closer to solving problems of real interest than a decade ago. Separately, recent experiments in fluid mechanics have...

    Provided By Cornell University

  • White Papers // Oct 2013

    C2MS: Dynamic Monitoring and Management of Cloud Infrastructures

    Server clustering is a common design principle employed by many organizations that require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the service they provide whether it is the applications installed the role of the server or server accessibility for example. In order...

    Provided By Cornell University

  • White Papers // Dec 2013

    Early Observations on Performance of Google Compute Engine for Scientific Computing

    Although cloud computing emerged for business applications in industry, public cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific...

    Provided By Cornell University

  • White Papers // Jul 2013

    The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems

    In the past decades, in order to store big data and provide services, more and more organizations around the world build data centers with scales varying from several nodes to hundreds of thousands of nodes. The people live in an era of big data, and big data applications are becoming...

    Provided By Cornell University

  • White Papers // Jan 2014

    Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics

    Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its place. It has provided a unique opportunity for online services, such that the user need not physically present at the service center. These services adopt...

    Provided By Cornell University

  • White Papers // Jan 2014

    Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing

    In this paper, the authors address the issues of using edge detection techniques on facial images to produce cancellable biometric templates and a novel method for template verification against tampering. With increasing use of biometrics, there is a real threat for the conventional systems using face databases, which store images...

    Provided By Cornell University

  • White Papers // Jan 2014

    Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    High-Dimensional Quantum Key Distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. The authors consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down conversion, and show that it is secure against collective attacks. Its security rests upon visibility data - obtained from Franson...

    Provided By Cornell University

  • White Papers // Jan 2014

    New Approaches to Website Fingerprinting Defenses

    Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ineffective. This paper advances the study of website fingerprinting attacks and defenses...

    Provided By Cornell University

  • White Papers // Jan 2014

    Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases

    With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Novel Admission Control Model in Cloud Computing

    With the rapid development of cloud computing technologies and wide adopt of cloud services and applications, QoS provisioning in clouds becomes an important research topic. In this paper, the authors propose an admission control mechanism for cloud computing. In particular, they consider the high volume of simultaneous requests for cloud...

    Provided By Cornell University

  • White Papers // Jan 2014

    DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper...

    Provided By Cornell University

  • White Papers // Feb 2012

    MORSE: Multi-objective Reconfigurable Self-optimizing Memory Scheduler

    Modern high-performance memory subsystems support a high degree of concurrency. This is primarily accomplished by increasing the number of independent channels and/or increasing the number of independent banks in a channel. The authors propose a systematic and general approach to designing self-optimizing memory schedulers that can target arbitrary figures of...

    Provided By Cornell University

  • White Papers // Apr 2014

    GraphGen: An FPGA Framework for Vertex-Centric Graph Computation

    Vertex-centric graph computations are widely used in many machine learning and data mining applications that operate on graph data structures. This paper presents GraphGen, a vertex-centric framework that targets FPGA for hardware acceleration of graph computations. GraphGen accepts a vertex-centric graph specification and automatically compiles it onto an application-specific synthesized...

    Provided By Cornell University

  • White Papers // May 2013

    Effect of Data Preprocessing on Software Effort Estimation

    Software effort estimation requires high accuracy, but accurate estimations are difficult to achieve. Increasingly, data mining is used to improve an organization's software process quality, e.g. the accuracy of effort estimations .There are a large number of different method combination exists for software effort estimation, selecting the most suitable combination...

    Provided By Cornell University

  • White Papers // Dec 2013

    Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis

    Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection....

    Provided By Cornell University

  • White Papers // Nov 2013

    Parallel Tempering Simulation of the three-dimensional Edwards-Anderson Model with Compact Asynchronous Multispin Coding on GPU

    Monte Carlo simulations of the Ising model play an important role in the field of computational statistical physics, and they have revealed many properties of the model over the past few decades. However, the effect of frustration due to random disorder, in particular the possible spin glass phase, remains a...

    Provided By Cornell University

  • White Papers // Nov 2013

    Limits of Extractability Assumptions with Distributional Auxiliary Input

    Extractability, or \"Knowledge\", assumptions (such as the \"Knowledge-of-exponent\" assumption) have recently gained popularity in the cryptographic community - leading to the study of primitives such as extractable one-way functions, extractable hash functions, Succinct Non-interactive ARguments of Knowledge (SNARKs), and extractable obfuscation, and spurring the development of a wide spectrum of...

    Provided By Cornell University

  • White Papers // Apr 2013

    Optimizing Cost, Delay, Packet Loss and Network Load in AODV Routing Protocol

    AODV is Ad-hoc On-Demand Distance Vector. A mobile ad-hoc network is a self-configuring network of mobile devices connected by wireless. MANET does not have any fixed infrastructure. The device in a MANET is free to move in any direction and will form the connection as per the requirement of the...

    Provided By Cornell University

  • White Papers // Jan 2011

    Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs

    Concurrent Non-Malleable Zero-Knowledge (CNMZK) considers the concurrent execution of zero-knowledge protocols in a setting where the attacker can simultaneously corrupt multiple provers and verifiers. The authors provide the first construction of a CNMZK protocol that, without any trusted set-up, remains secure even if the attacker may adaptively select the statements...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Non-Black-Box Lower Bounds in Cryptography

    In the past four decades, many cryptographic tasks have been put under rigorous treatment in an effort to realize these tasks under minimal assumptions. The authors consider average-case strengthening's of the traditional assumption that coNP is not contained in AM. Under these assumptions, they rule out generic and potentially non-black-box...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy

    The authors put forward a zero-knowledge based definition of privacy. Their notion is strictly stronger than the notion of differential privacy and is particularly attractive when modeling privacy in social networks. They furthermore demonstrate that it can be meaningfully achieved for tasks such as computing averages, fractions, histograms, and a...

    Provided By Cornell University

  • White Papers // Jun 2012

    Development of Low Cost Private Office Access Control System(OACS)

    Over the years, access control systems have become more and more sophisticated and several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and...

    Provided By Cornell University

  • White Papers // Sep 2013

    Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services

    As tools for personal storage, file synchronization and data sharing, cloud storage services such as Dropbox have quickly gained popularity. These services provide users with ubiquitous, reliable data storage that can be automatically synced across multiple devices, and also shared among a group of users. To minimize the network overhead,...

    Provided By Cornell University

  • White Papers // Dec 2013

    Verifying the Consistency of Remote Untrusted Services with Commutative Operations

    A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network

    Wireless Sensor Networks (WSN) are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, security is one of the major aspects of...

    Provided By Cornell University

  • White Papers // Jan 2014

    Power Grid Defense Against Malicious Cascading Failure

    An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns...

    Provided By Cornell University

  • White Papers // Sep 2006

    Dynamic Capacity-Speed Tradeoffs in SMT Processor Caches

    Caches are designed to provide the best tradeoff between access speed and capacity for a set of target applications. Unfortunately, different applications, and even different phases within the same application, may require a different capacity-speed tradeoff. This problem is exacerbated in a Simultaneous Multi-Threaded (SMT) processor where the optimal cache...

    Provided By Cornell University

  • White Papers // Mar 2013

    URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme

    Design efficient lattice-based cryptosystem secure against adaptive Chosen Ciphertext Attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based cryptosystems achieved by using a generic transformations such as either Strongly Unforgeable One-Time Signature Schemes (SU-OT-SS), or a Message Authentication Code (MAC) and weak form of...

    Provided By Cornell University

  • White Papers // Sep 2011

    A Contribution to Secure the Routing Protocol \"Greedy Perimeter Stateless Routing'' Using a Symmetric Signature-Based AES and MD5 Hash

    In this paper, the authors present a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, they examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, they propose a solution to...

    Provided By Cornell University

  • White Papers // May 2012

    On the Security of Arbitrated Quantum Signature Schemes

    Due to potential capability of providing unconditional security, Arbitrated Quantum Signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were crypt analyzed and improved. In this paper, the authors analyze security property of...

    Provided By Cornell University

  • White Papers // Sep 2012

    Managing Complex Structured Data In a Fast Evolving Environment

    Criminal data comes in a variety of formats, mandated by state, federal, and international standards. Specifying the data in a unified fashion is necessary for any system that intends to integrate with state, federal, and international law enforcement agencies. However, the contents, format, and structure of the data is highly...

    Provided By Cornell University

  • White Papers // Feb 2008

    Rethinking OpenPGP PKI and OpenPGP Public Keyserver

    OpenPGP, an IETF Proposed Standard based on PGP R application, has its own Public Key Infrastructure (PKI) architecture which is different from the one based on X.509, another standard from ITU. This paper describes the OpenPGP PKI; the historical perspective as well as its current use. The authors also compare...

    Provided By Cornell University

  • White Papers // Oct 2012

    Evaluation of Distributed Intelligence on the Smart Card

    The authors describe challenges in the risk management of smart card based electronic cash industry and describe a method to evaluate the effectiveness of distributed intelligence on the smart card. More specifically, they discuss the evaluation of distributed intelligence function called \"On-chip risk management\" of the smart card for the...

    Provided By Cornell University

  • White Papers // Jun 2013

    Cryptocat: Adopting Accessibility and Ease of Use as Security Properties

    Cryptocat is a Free and Open Source Software (FL/OSS) browser extension that makes use of web technologies in order to provide easy to use, accessible, encrypted instant messaging to the general public. The authors aim to investigate how to best leverage the accessibility and portability offered by web technologies in...

    Provided By Cornell University