Florida State University

Displaying 1-40 of 76 results

  • White Papers // Jul 2013

    Trusted Clouds

    A new paradigm for network applications emerged in the 1990s as the centralized mainframe computer model evolved into a PC client/server based model. This captured a broader scope including business, commerce and finance. Recent Cloud computing and Big Data deployments suggest that the authors have now come full circle with...

    Provided By Florida State University

  • White Papers // Jun 2013

    T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems

    In highly dynamic systems resources may have to be accessed in real-time, within the strict time limits of underlying physical processes, with availability becoming critical. Current access control models such as RBAC and ABAC do not address real-time availability in a scalable way for such scenarios. In this paper the...

    Provided By Florida State University

  • White Papers // Jan 2013

    An Architecture for Trusted Clouds

    A new paradigm for network applications emerged in the 1990s as the centralized mainframe computer model evolved into a PC client/server based model. This captured a broader scope including business, commerce and finance. Recent, cloud computing and big data deployments suggest that the authors have now come full circle with...

    Provided By Florida State University

  • White Papers // Jan 2013

    A Traceback Attack on Freenet

    Freenet is a popular peer to peer anonymous network, with the objective to provide the anonymity of both content publishers and retrievers. Despite more than a decade of active development and deployment and the adoption of well-established cryptographic algorithms in freenet, it remains unanswered how well the anonymity objective of...

    Provided By Florida State University

  • White Papers // Nov 2012

    Retransmission Rate Selection for Block-Based Partial Packet Recovery

    In a Wi-Fi network, partial packets often exist which are packets with some errors. Recent works show that much better efficiency can be achieved by repairing such packets instead of retransmitting such packets. In this paper, the authors propose a rate selection scheme for the repair packets, referred to as...

    Provided By Florida State University

  • White Papers // Nov 2012

    A Sender-Centric Approach to Detecting Phishing Emails

    Email-based online phishing is a critical security threat on the Internet. Although phishers have great flexibility in manipulating both the content and structure of phishing emails, phishers have much less flexibility in completely concealing the sender information of a phishing message. Importantly, such sender information is often inconsistent with the...

    Provided By Florida State University

  • White Papers // Oct 2012

    A Thief Among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications

    Insider threats are both social and technological phenomena, and group dynamics can provide important indicators to help counter insider threats. This paper discusses an experimental study that simulates insider betrayal in an online collaborative environment. This study uses the framework of trustworthiness attribution, wherein the authors examine the trustworthiness of...

    Provided By Florida State University

  • White Papers // Aug 2011

    Hierarchical Object Parsing From Noisy Point Clouds

    Object parsing and segmentation from point clouds are challenging tasks because the relevant data is available only as thin structures along object boundaries or other object features and is corrupted by large amounts of noise. One way to handle this kind of data is by employing shape models that can...

    Provided By Florida State University

  • White Papers // Apr 2011

    Localization Privacy

    Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (Radio Frequency IDentification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and healthcare. However it can also be used for accurate...

    Provided By Florida State University

  • White Papers // Feb 2011

    A New Bound on the Performance of the Bandwidth Puzzle

    A bandwidth puzzle was recently proposed to defend against colluding adversaries in peer-to-peer networks. The colluding adversaries do not do actual work but claim to have uploaded contents for each other to gain free credits from the system. The bandwidth puzzle guarantees that if the adversaries can solve the puzzle,...

    Provided By Florida State University

  • White Papers // Feb 2011

    Secure and Privacy-Preserving, Timed Vehicular Communication

    In this paper the authors consider the problem of privacy and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one...

    Provided By Florida State University

  • White Papers // Feb 2011

    Improving Low Power Processor Efficiency with Static Pipelining

    A new generation of mobile applications requires reduced energy consumption without sacrificing execution performance. In this paper, the authors propose to respond to these conflicting demands with an innovative statically pipelined processor supported by an optimizing compiler. The central idea of the approach is that the control during each cycle...

    Provided By Florida State University

  • White Papers // Feb 2011

    Quantifying Temporal and Spatial Localities in Storage Workloads and Transformations by Data Path Components

    To increase performance, modern storage consists of many data path components, from the front-end file system cache and disk layout management to the back-end disk controller cache and on-disk caching. Various components generally exploit the temporal and spatial localities in workloads to achieve performance gain. However, how localities of a...

    Provided By Florida State University

  • White Papers // Jan 2011

    On Nonblocking Folded-Clos Networks in the Computer Communication Environment

    Folded-Clos networks, also referred to as fat-trees, have been widely used as interconnects in large scale high performance computing clusters. The switching capability of such interconnects in the computer communication environment, however, is not well understood. In particular, the concept of nonblocking interconnects, which is often used by system vendors,...

    Provided By Florida State University

  • White Papers // Jan 2011

    A Tree-Based Model of Unicast Stream Authentication

    When proving the security of a message authentication scheme, the messages are considered to be atomic objects. Straightforward application of such schemes to some information resources may introduce security flaws. Gennaro and Rohatgi (Crypto '97) identified the streams of data as an important class of information resources that can not...

    Provided By Florida State University

  • White Papers // Jan 2011

    His Late Master's Voice: Barking for Location Privacy

    Radio Frequency IDentification (RFID) is a promising new technology widely deployed for supply-chain and inventory management, retail operations and more generally, automatic identification. The advantage of RFID over barcode technology is that it does not require line-of-sight reading. Furthermore RFID readers can interrogate RFID tags (devices) at greater distances, faster...

    Provided By Florida State University

  • White Papers // Jan 2011

    A Flexible Cluster Infrastructure for Systems Research and Software Development

    This paper reports the current status of the CRI project. This paper designed a flexible cluster infrastructure that can be configured to emulate various high-end clusters. This computing research infrastructure will facilitate systems research and development, and greatly improve the research productivity of the participating groups. Due to the unexpected...

    Provided By Florida State University

  • White Papers // Jan 2011

    Towards Provable Security for Route Discovery Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes. Discovering such routes however is a major task, both from an efficiency point of view and from a security point...

    Provided By Florida State University

  • White Papers // Jan 2011

    Adaptive Gossip Protocols: Managing Security and Redundancy in Dense Ad Hoc Networks

    Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but because of its extreme redundancy, it is impractical in dense networks. Indeed in large wireless networks, the use of flooding algorithms may lead to broadcast...

    Provided By Florida State University

  • White Papers // Jan 2011

    Towards Provable Security for Route Discovery Protocols in MANETs

    Mobile Ad hoc NETworks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both...

    Provided By Florida State University

  • White Papers // Jan 2011

    Forward-Secure RFID Authentication and Key Exchange

    Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes two families of simple, inexpensive, and untraceable identification protocols for RFID tags. The proposed...

    Provided By Florida State University

  • White Papers // Jan 2011

    BCSQ: Bin-Based Core Stateless Queueing for Scalable Support of Guaranteed Services

    Core stateless packet scheduling systems have received considerable attention in recent years because of their scalability in supporting per-flow Quality of Services guarantees. In such a system core routers do not need to maintain per-flow state and do not need to perform per-flow operations such as per-flow classification, per-flow queueing,...

    Provided By Florida State University

  • White Papers // Jan 2011

    Behavioral Characteristics of Spammers and Their Network Reachability Properties

    The majority of earlier studies on the email spam have focused on the contents of email messages so as to distinguish spam messages from legitimate ones. However, there is a growing realization in the networking community that effective anti-spam techniques can be developed only with a clear understanding of the...

    Provided By Florida State University

  • White Papers // Jan 2011

    Efficient Processing of Top-K Queries in Uncertain Databases

    This work introduces novel polynomial-time algorithms for processing top-k queries in uncertain databases, under the generally adopted model of x-relations. An x-relation consists of a number of x-tuples, and each x-tuple randomly instantiates into one tuple from one or more alternatives. The results significantly improve the best known algorithms for...

    Provided By Florida State University

  • White Papers // Jan 2011

    Controlling IP Spoofing Based DDoS Attacks Through Inter-Domain Packet Filters

    The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge, or spoof, the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden...

    Provided By Florida State University

  • White Papers // Jan 2011

    Tuning the WCET of Embedded Applications

    It is advantageous to not only calculate the WCET of an application, but to also perform transformations to reduce the WCET since an application with a lower WCET will be less likely to violate its timing constraints. In this paper the authors describe an environment consisting of an interactive compilation...

    Provided By Florida State University

  • White Papers // Jan 2011

    An MPI Prototype for Compiled Communication on Ethernet Switched Clusters

    Compiled communication has recently been proposed to improve communication performance for clusters of workstations. The idea of compiled communication is to apply more aggressive optimizations to communications whose information is known at compile time. Existing MPI libraries do not support compiled communication. This paper presents an MPI prototype, CC-MPI, that...

    Provided By Florida State University

  • White Papers // Jan 2011

    An Empirical Study of Reliable Multicast Protocols Over Ethernet-Connected Networks

    Recent advances in multicasting over the Internet present new opportunities for improving communication performance for clusters of workstations. Realizing collective communication over reliable multicast can achieve higher performance than over reliable unicast primitives. The standard IP multicast, however, only supports unreliable multicast, which is difficult to use for building high...

    Provided By Florida State University

  • White Papers // Jan 2011

    Communication Characteristics in the NAS Parallel Benchmarks

    This paper investigates the communication characteristics of the Message Passing Interface (MPI) implementation of the NAS parallel benchmarks and study the effectiveness of compiled communication for MPI programs. Compiled communication is a technique that utilizes the compiler knowledge of both the application communication requirement and the underlying network architecture to...

    Provided By Florida State University

  • White Papers // Jan 2011

    A Message Scheduling Scheme for All-to-All Personalized Communication on Ethernet Switched Clusters

    This paper develops a message scheduling scheme for efficiently realizing All-to-All Personalized Communication (AAPC) on Ethernet switched clusters with one or more switches. To avoid network contention and achieve high performance, the message scheduling scheme partitions AAPC into phases such that there is no network contention within each phase; and...

    Provided By Florida State University

  • White Papers // Jan 2011

    Bandwidth Optimal All-Reduce Algorithms for Clusters of Workstations

    The authors consider an efficient realization of the all-reduce operation with large data sizes in cluster environments, under the assumption that the reduce operator is associative and commutative. The authors derive a tight lower bound of the amount of data that must be communicated in order to complete this operation...

    Provided By Florida State University

  • White Papers // Jan 2011

    Load Balancing Mechanisms in Data Center Networks

    The authors consider network traffic load balancing mechanisms in data center networks with scale-out topologies such as folded Clos or fat-tree networks. This paper investigates the flow-level Valiant Load Balancing (VLB) technique that uses randomization to deal with highly volatile data center network traffics. Through extensive simulation experiments, the authors...

    Provided By Florida State University

  • White Papers // Dec 2010

    Employing Coded Relay in Multi-Hop Wireless Networks

    In this paper, the authors study Coded relay (Crelay) in multi-hop wireless networks. Crelay exploits both partial packets and overhearing capabilities of the wireless nodes, and uses Forward Error Correction code in packet forwarding. When a node overhears a partial packet from an upstream node, it informs the upstream node...

    Provided By Florida State University

  • White Papers // Nov 2010

    Optimal Location Queries in Road Network Databases

    This paper presents a comprehensive study on optimal location queries in road network databases, closing the gap between previous studies and practical applications in road networks. The study covers three important types of optimal location queries, and introduces a unified framework that addresses all three query types efficiently. Extensive experiments...

    Provided By Florida State University

  • White Papers // Sep 2010

    Lightweight RFID Authentication With Forward and Backward Security

    This paper proposes a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a PseudoRandom Number Generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG....

    Provided By Florida State University

  • White Papers // Aug 2010

    BEAT: Bio-Environmental Android Tracking

    The popularity of wireless devices has been pushing the envelope for medical applications. These devices, paired with a personal health monitoring framework can enable early detection and increased quality of life of citizen of developed nations. These devices are helping supplement the available disease detection and treatment techniques, as well...

    Provided By Florida State University

  • White Papers // Jul 2010

    Reflective Pedagogy: Making Meaning in Experiential Based Online Courses

    The use of reflective pedagogies has long been considered critical to facilitating meaningful learning through experientially based curricula; however, the use of such methods has not been extensively explored as implemented in virtual environments. The authors utilize a combination of survey research and individual interviews to examine student perceptions of...

    Provided By Florida State University

  • White Papers // Jun 2010

    Understanding Forgery Properties of Spam Delivery Paths

    It is well known that spammers can forge the header of an email, in particular, the trace information carried in the Received: fields, as an attempt to hide the true origin of the email. Despite its critical importance for spam control and holding accountable the true originators of spam, there...

    Provided By Florida State University

  • White Papers // Jun 2010

    CRC: Protected LRU Algorithm

    Additional on-chip transistors as well as more aggressive processors have led the way for an ever expanding memory hierarchy. Multi-core architectures often employ the use of a shared L3 cache to reduce accesses to off chip memory. Such memory structures often incur long latency (as much as 30 cycles in...

    Provided By Florida State University

  • White Papers // Apr 2010

    Re-Defining the Tournament Predictor for Embedded Systems

    Looking at trends in recent publications on computer architecture the authors find that there has been a steep decline in the number of published works relating to branch prediction. Further inspection reveals that while older trends include development of new predictor designs, more modern trends have been favoring the consumption...

    Provided By Florida State University

  • White Papers // Jan 2011

    On Nonblocking Folded-Clos Networks in the Computer Communication Environment

    Folded-Clos networks, also referred to as fat-trees, have been widely used as interconnects in large scale high performance computing clusters. The switching capability of such interconnects in the computer communication environment, however, is not well understood. In particular, the concept of nonblocking interconnects, which is often used by system vendors,...

    Provided By Florida State University

  • White Papers // Jan 2011

    A Tree-Based Model of Unicast Stream Authentication

    When proving the security of a message authentication scheme, the messages are considered to be atomic objects. Straightforward application of such schemes to some information resources may introduce security flaws. Gennaro and Rohatgi (Crypto '97) identified the streams of data as an important class of information resources that can not...

    Provided By Florida State University

  • White Papers // Jan 2007

    An Examination Of Low Transparency Through Repurchase Activities

    In this paper, the author will examine if low transparency firms are more successful in repurchasing undervalued stock and earn higher market-timing profits than high transparency firms. Low transparency firms have more information asymmetry problems (Diamond and Verrechia (1991)), while information asymmetry can make stock valuation of low transparency firms...

    Provided By Florida State University

  • White Papers // Mar 2009

    Learning Real-Time MRF Inference for Image Denoising

    Many computer vision problems can be formulated in a Bayesian framework with Markov Random Field (MRF) or Conditional Random Field (CRF) priors. Usually, the model assumes that a full Maximum A Posteriori (MAP) estimation will be performed for inference, which can be really slow in practice. In this paper, the...

    Provided By Florida State University

  • White Papers // Aug 2011

    Hierarchical Object Parsing From Noisy Point Clouds

    Object parsing and segmentation from point clouds are challenging tasks because the relevant data is available only as thin structures along object boundaries or other object features and is corrupted by large amounts of noise. One way to handle this kind of data is by employing shape models that can...

    Provided By Florida State University

  • White Papers // Jan 2011

    His Late Master's Voice: Barking for Location Privacy

    Radio Frequency IDentification (RFID) is a promising new technology widely deployed for supply-chain and inventory management, retail operations and more generally, automatic identification. The advantage of RFID over barcode technology is that it does not require line-of-sight reading. Furthermore RFID readers can interrogate RFID tags (devices) at greater distances, faster...

    Provided By Florida State University

  • White Papers // Sep 2008

    Multi-Domain Trust Management in Variable-Threat Environments Using Rollback-Access

    Trust management systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper, the authors describe an extension suitable for multi-domain applications in variable-threat environments that allows for temporary adjustments of trust levels in response to elevated threat levels, and which can be reversed without...

    Provided By Florida State University

  • White Papers // Apr 2011

    Localization Privacy

    Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (Radio Frequency IDentification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and healthcare. However it can also be used for accurate...

    Provided By Florida State University

  • White Papers // Sep 2008

    Strengthening Privacy Protection in VANETs

    In the not so far future, vehicles are expected to be able to communicate with each other and with the road infrastructure, to enhance driving experience and support road safety, among others. Vehicular Ad-hoc NETworks (VANETs) introduce a number of security challenges to the research community, mainly concerning the tradeoff...

    Provided By Florida State University

  • White Papers // Nov 2012

    Retransmission Rate Selection for Block-Based Partial Packet Recovery

    In a Wi-Fi network, partial packets often exist which are packets with some errors. Recent works show that much better efficiency can be achieved by repairing such packets instead of retransmitting such packets. In this paper, the authors propose a rate selection scheme for the repair packets, referred to as...

    Provided By Florida State University

  • White Papers // Oct 2012

    A Thief Among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications

    Insider threats are both social and technological phenomena, and group dynamics can provide important indicators to help counter insider threats. This paper discusses an experimental study that simulates insider betrayal in an online collaborative environment. This study uses the framework of trustworthiness attribution, wherein the authors examine the trustworthiness of...

    Provided By Florida State University

  • White Papers // Jan 2009

    The Security of EPC Gen2 Compliant RFID Protocols

    The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very basic security tools such as a 16-bit Pseudo-Random Number Generator and a 16-bit Cyclic Redundancy Code. Recently two EPCGen2 compliant protocols that address...

    Provided By Florida State University

  • White Papers // Jan 2009

    A Differentiated Message Delivery Architecture to Control Spam

    Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet Email system and deteriorating its value as a convenient communication tools. This paper argues that the difficulties in controlling spam can be attributed to the lack of receiver control on how different Email messages should be delivered on the Internet....

    Provided By Florida State University

  • White Papers // Aug 2009

    10 Ways to Use Laptops in Teaching and Learning

    Various teaching and learning strategies can be used promote critical thinking and collaboration among students. Facilitate problem-based learning and team-based learning by having students integrate laptops as devices for research, communication, and development. Working together using computer-based resources, discussion boards, email, and synchronous chat rooms, students can identify issues, share...

    Provided By Florida State University

  • White Papers // Jun 2009

    Solutions for Regulating Offshore Outsourcing in the Service Sector: Using the Law, Market, International Mechanisms, and Collective Organization as Building Blocks

    Due to technological advancements in telecommunications, transportation, and information processing, the typical work performed by service sector employees has dramatically changed. The typewriter, formal secretary, and filing rooms of past years have all given way to new technological phenomena demarcated as progressive steps toward greater corporate efficiency. Because modem service...

    Provided By Florida State University

  • White Papers // Jan 2010

    Centralized Channel Assignment and Routing Algorithms for Multi-Channel Wireless Mesh Networks

    Despite significant advances in physical layer technologies, today's Wireless LAN still cannot offer the same level of sustained bandwidth as their wired brethren. The advertised 54 Mbps bandwidth for IEEE 802.11a/g based hardware is the peak link-level data rate. When all the overheads - MAC contention, 802.11 headers, 802.11 ACK,...

    Provided By Florida State University

  • White Papers // Jul 2010

    Reflective Pedagogy: Making Meaning in Experiential Based Online Courses

    The use of reflective pedagogies has long been considered critical to facilitating meaningful learning through experientially based curricula; however, the use of such methods has not been extensively explored as implemented in virtual environments. The authors utilize a combination of survey research and individual interviews to examine student perceptions of...

    Provided By Florida State University

  • White Papers // Jan 2010

    Bandwidth Efficient All-to-All Broadcast on Switched Clusters

    This paper develops an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using the scheme for clusters with cut-through switches, any tree topology can support all-to-all broadcast as efficiently as a single switch connecting all machines when the message size is sufficiently large. Since a...

    Provided By Florida State University

  • White Papers // Jan 2010

    A Study of Dynamic Routing and Wavelength Assignment With Imprecise Network State Information

    In large networks, maintaining precise global network state information is almost impossible. Many factors, such as non-negligible propagation delay, infrequent state updates due to overhead concerns, and hierarchical topology aggregation, can affect the precision of the global network state information. In this paper, authors investigate the impact of imprecise state...

    Provided By Florida State University

  • White Papers // Jan 2010

    Techniques for Pipelined Broadcast on Ethernet Switched Clusters

    By splitting a large broadcast message into segments and broadcasting the segments in a pipelined fashion, pipelined broadcast can achieve high performance in many systems. This paper investigates techniques for efficient pipelined broadcast on clusters connected by multiple Ethernet switches. Specifically, this paper develop algorithms for computing various contention-free broadcast...

    Provided By Florida State University

  • White Papers // Jan 2010

    Empirical Probability Based QoS Routing

    This paper explores Quality-of-Service (QoS) routing schemes that make routing decisions based on empirical resource availability probability information. This empirical probability based routing schemes offer better performance than traditional schemes that make routing decisions based on resource availability information when the global network state information is imprecise. This paper investigate...

    Provided By Florida State University

  • White Papers // Jan 2010

    A Comparative Study of QoS Routing Schemes That Tolerate Imprecise State Information

    In large networks, maintaining precise global network state information is almost impossible. Many factors, including no negligible propagation delay, infrequent link state update due to overhead concerns, link state update policy, resource reservation, and hierarchical topology aggregation, have impacts on the precision of the global network state information. To achieve...

    Provided By Florida State University

  • White Papers // Aug 2010

    BEAT: Bio-Environmental Android Tracking

    The popularity of wireless devices has been pushing the envelope for medical applications. These devices, paired with a personal health monitoring framework can enable early detection and increased quality of life of citizen of developed nations. These devices are helping supplement the available disease detection and treatment techniques, as well...

    Provided By Florida State University

  • White Papers // Mar 2010

    Energy Efficiency And Renewable Energy In Florida

    Energy supply and production is of critical importance for Floridians. Florida, and the nation, in general, are concerned with the status of current energy reserves; based primarily on non-renewable resources. The diversification of the nation's energy portfolio to include renewable resources helps improve: 1) energy reliability and independence from foreign...

    Provided By Florida State University

  • White Papers // Jan 2011

    A Flexible Cluster Infrastructure for Systems Research and Software Development

    This paper reports the current status of the CRI project. This paper designed a flexible cluster infrastructure that can be configured to emulate various high-end clusters. This computing research infrastructure will facilitate systems research and development, and greatly improve the research productivity of the participating groups. Due to the unexpected...

    Provided By Florida State University

  • White Papers // Sep 2010

    Lightweight RFID Authentication With Forward and Backward Security

    This paper proposes a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a PseudoRandom Number Generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG....

    Provided By Florida State University

  • White Papers // Jun 2009

    Secure EPC Gen2 Compliant Radio Frequency Identification

    The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 compliant protocols that address security issues were proposed in the literature. This paper analyzes these protocols and show that they are not secure and...

    Provided By Florida State University

  • White Papers // Jun 2009

    A Flyweight RFID Authentication Protocol

    This paper first discusses the security threats that have to be addressed when dealing with lightweight RFID protocols: in particular, privacy/integrity attacks that compromise the forward and backward security of tags. The authors then analyze some recently proposed EPCGen2 com-pliant protocols. Finally, this paper proposes a lightweight RFID authentication protocol...

    Provided By Florida State University

  • White Papers // Feb 2010

    Provably Secure Grouping-Proofs for RFID Tags

    This paper investigates an application of RFIDs referred to in the literature as group scanning, in which several tags are "Simultaneously" scanned by a reader device. The goal is to study the group scanning problem in strong adversarial models. The authors present a security model for this application and give...

    Provided By Florida State University

  • White Papers // Feb 2011

    Secure and Privacy-Preserving, Timed Vehicular Communication

    In this paper the authors consider the problem of privacy and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one...

    Provided By Florida State University

  • White Papers // Oct 2008

    Secure Random Key Pre-Distribution Against Semi-Honest Adversaries

    Recently, Eschenauer and Gligor [EG02] proposed a model (The EG-model) for random key pre-distribution in distributed sensor networks (DSN) that allows sensors to establish private shared keys. In this model, each sensor is randomly assigned a set of keys, called a key-ring, from a secret key-pool. Two nodes can communicate...

    Provided By Florida State University

  • White Papers // Jan 2011

    Towards Provable Security for Route Discovery Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes. Discovering such routes however is a major task, both from an efficiency point of view and from a security point...

    Provided By Florida State University

  • White Papers // Jan 2011

    Adaptive Gossip Protocols: Managing Security and Redundancy in Dense Ad Hoc Networks

    Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but because of its extreme redundancy, it is impractical in dense networks. Indeed in large wireless networks, the use of flooding algorithms may lead to broadcast...

    Provided By Florida State University

  • White Papers // Jan 2011

    Towards Provable Security for Route Discovery Protocols in MANETs

    Mobile Ad hoc NETworks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both...

    Provided By Florida State University

  • White Papers // Jan 2011

    Forward-Secure RFID Authentication and Key Exchange

    Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes two families of simple, inexpensive, and untraceable identification protocols for RFID tags. The proposed...

    Provided By Florida State University

  • White Papers // Feb 2009

    Dynamic Iterations for the Solution of Ordinary Differential Equations on Multicore Processors

    In the past few years, there has been a trend of providing increased computing power through greater number of cores on a chip, rather than through higher clock speeds. In order to exploit the available computing power, applications need to be parallelized efficiently. The authors consider the solution of Ordinary...

    Provided By Florida State University

  • White Papers // Feb 2009

    Optimizing Assignment of Threads to SPEs on the Cell BE Processor

    The Cell is a heterogeneous multicore processor that has attracted much attention in the HPC community. The bulk of the computational workload on the Cell processor is carried by eight co-processors called SPEs. The SPEs are connected to each other and to main memory by a high speed bus called...

    Provided By Florida State University

  • White Papers // Nov 2010

    Optimal Location Queries in Road Network Databases

    This paper presents a comprehensive study on optimal location queries in road network databases, closing the gap between previous studies and practical applications in road networks. The study covers three important types of optimal location queries, and introduces a unified framework that addresses all three query types efficiently. Extensive experiments...

    Provided By Florida State University

  • White Papers // Oct 2009

    Approximate String Search in Spatial Databases

    This paper presents a novel index structure, MHRtree, for efficiently answering approximate string match queries in large spatial databases. The MHR-tree is based on the R-tree augmented with the min-wise signature and the linear hashing technique. The min-wise signature for an index node u keeps a concise representation of the...

    Provided By Florida State University

  • White Papers // Oct 2009

    K Nearest Neighbor Queries and KNN-Joins in Large Relational Databases (Almost) for Free

    Finding the k Nearest Neighbors (kNN) of a query point, or a set of query points (kNN-Join) are fundamental problems in many application domains. Many previous efforts to solve these problems focused on spatial databases or standalone systems, where changes to the database engine may be required, which may limit...

    Provided By Florida State University