Helsinki University of Technology

Displaying 1-34 of 34 results

  • White Papers // Jan 2012

    Peer-to-Peer Communication

    Internet has changed a lot since its early days. At the beginning, goal of the Internet was to share computing resources between universities and scientists. In those days communication happened almost completely directly between computers or people. This is something the authors now call peer-to-peer communication. After the commercialization of...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2011

    Energy-Efficient Parallel Software for Mobile Hand-Held Devices

    Energy efficiency is an essential design criterion for mobile hand-held devices. The authors underline the issue that parallel programs for mobile devices must be efficiently executable on the development platforms in addition to their efficient execution on the target hardware. Further, they argue that with the proliferation of increasingly complex...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Real-Time Transport Protocol (RTP) Security

    This paper describes the Real-time Transport Protocol (RTP). The emphasis is on the security features like confidentiality, integrity and authentication. RTP security features are critically commented and alternative arrangements with their security implications are presented. RTP security is also discussed on multi protocol context where some of RTP's security services...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Implementing an SPKI Certificate Repository Within the DNS

    Authorization certificates can be used to grant access rights from the owner of a resource to other entities and then to further share these rights with others using delegation. However, when access decisions are made, the delegated rights will not be acknowledged unless all the certificates iii the delegation chain...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    User-Centered Design of Secure Software

    With the advance of electronic commerce and other networked services there is a growing need for easy to use secure software. The problem with the security features and applications in much of today's software is that it is very technology-oriented. In order to correctly use it a basic knowledge of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Grid Computing Aptitude of Well-Known Charity or Other Non-Profit Organizations

    Grid computing is a form of distributed computing where a centralized client computer distributes computations among a large number of server computers. There exists several grid computing projects that utilize computers of home users for applications that require a great amount of computing resources. The authors consider two charity and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems

    In distributed systems, the access control mechanism in is often modeled after stand-alone solutions, such as A CLs. Such arrangement, however, is not ideal as the system may be mirrored around the world and maintaining the A CLs becomes a problem. A new approach to this problem is using authorisation...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    MOBNET: The Design and Implementation of a Network Mobility Testbed for NEMO Protocol

    The inherent difficulty in faithfully modeling wireless channel characteristics in simulators has prompted researchers to build wireless network testbeds for realistic testing of protocols. While previous testbeds are mostly designed to provide a research environment of static wireless networks, the paper is aimed to assess protocols used for mobile wireless...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Impact of Size-Based Scheduling on Flow Level Performance in Wireless Downlink Data Channels

    The authors analyze the impact of size-based scheduling on the flow level performance of elastic traffic in wireless downlink data channels. The impact is assessed by comparing the flow level delay of the simple RR scheduler to two optimized non-anticipating schedulers (FB and FBffi) and SRPT. The optimized distance-aware scheduler...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Running an i3 Overlay Network on Top of AODV

    Mobile Ad hoc NETworks (MANETs) and Peer-To-Peer (P2P) overlay networks share many key features. Both can be viewed as decentralized self-organizing networks. Both usually have flat address spaces and their network topologies may change in unpredictable ways. Therefore there has lately been a lot of interest in how to take...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparison Between Security Solutions in Cloud and Grid Computing

    This paper helps Grid and Cloud system administrators and researchers to have a clear definition about Grid and Cloud computing and also wants to give clear differences between Cloud and Grid computing, define which the main security issues to be considered are, and how some of these security issues are...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Strong Authentication With Mobile Phones

    Many of the services that people use daily, for example banking, have transformed from traditional customer services into Internet services. In important services, such as the banking, a strong authentication is needed to protect both the users of the services and the service providers. Due very rapid technical progress mobile...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparing Various Realizations of the Cloud Computing Paradigm

    Cloud Computing is becoming attractive these days. Many big companies, such as Google, Amazon and IBM, have promoted their own cloud computing platforms for customers to deploy their web applications on these platforms. Besides some existing security risks for a traditional web server hosting company, some new security vulnerabilities appear...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Privacy Challenges of Open APIs: Case LBS

    Many of the most popular Location-Based Services (LBSs) have recently released open APIs for developers in order to extend their services to third party applications. With this strategy, LBSs try to exploit to the maximum the value of location information by helping the fast development of specific context-aware applications involving...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2010

    Forwarding Anomalies in Bloom Filter Based Multicast

    Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-flow state is required in the routers and because routing decisions can be made efficiently by simply checking for the presence of outbound links in the filter. Yet,...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2010

    A Long-Tail Model of Mobile Application Usage

    In management research, the long tail phenomenon is typically linked to the long-tail of product demand distribution, particularly under electronic distribution, storing and consumption of content. This paper discusses the role of open mobile software platforms in creating a market for niche mobile applications. Open software platforms of smartphones facilitate...

    Provided By Helsinki University of Technology

  • White Papers // May 2010

    Clustering Malware Executables

    Traditional signature based malware detection can easily be evaded by doing small changes to the malware code or le. As each new instance of the malware is slightly different, it becomes challenging to detect which malware les are part of the same family. An alternative approach to signature based detections...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Energy-Adaptive Scheduling and Queue Management in Wireless LAN Mesh Networks

    Energy efficiency is of critical importance in future wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. The authors present a novel cross-layer energy-adaptive scheduling and queue management framework EAED (Energy Aware Early Detection) for minimizing energy consumption in WLAN mesh networks. EAED...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Build Mobile Phone Connectivity Over IP Networks

    Connecting two mobile phones through IP networks is challenging since mobile phones usually don't have a specific IPv4 address and connected through NATs and firewalls. Various methods can be used to build up connections for mobile devices over IP networks, such as Teredo, IPsec tunneling, OpenVPN, ICE, STUN and TURN....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Access Control Based on Content

    Internet has become a significant platform for sharing personal information and opinions. Web-Based Social Networks (WBSN) are rapidly getting more users to their community, and unfortunately these users are usually not aware of the privacy risks related to sharing personal content. Current access control mechanisms in WBSNs rely heavily on...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    Matching Service Strategies, Business Models and Modular Business Processes

    In recent decades, supply chains have diverged and new types of services and operators have emerged in the logistics sector. This paper focused on analyzing service strategies and service-related business models, as well as their modular business processes in logistic services. The aims are to describe these three levels and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    MMS (Multimedia Messaging Service) Enabled Web Map Dispatching Solution for Location Enhanced Fieldwork Management

    Field workers, such as service men, perform every day many different tasks at different locations. Work-orders can be in well-known locations, e.g. weekly checks. But most service companies get work orders also as an alert in places where service men have not visited frequently or ever. In such cases navigation...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    Requirements On Unique Identifiers For Managing Product Lifecycle Information - Comparison Of Alternative Approaches

    Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. The main difficulty is to maintain a communication link between the product item and its associated information as the product item moves over organizational borders and between different users. As network...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    From Quality of Service to Quality of Experience

    This paper gives detail of the Dagstuhl Seminar 09192 on "From Quality of Service to Quality of Experience " held in Schloss Dagstuhl, Leibniz Center for Informatics from May 05 to May 08, 2009. The seminar was organized with a view to discuss the change in the notion of Quality...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Influence of Antenna Radiation Pattern on Accuracy of ToA Estimation

    Ultra-WideBand (UWB) signals have very large bandwidth which allow accurate ranging using time domain techniques. Precise UWB ranging requires accurate estimation of Time of Arrival (ToA). Several schemes have been reported for ToA estimation. Among these schemes, the threshold based ToA estimators have attracted interest due to simplicity of its...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy Over IPv4 and IPv6 Networks

    The Host Identity Protocol (HIP) is an internetworking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This...

    Provided By Helsinki University of Technology

  • White Papers // Aug 2009

    Cache-Timing Template Attacks

    Cache-timing attacks are a serious threat to security-critical software. The authors show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. They demonstrate its effectiveness...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Query Significance in Databases Via Randomizations

    Many sorts of structured data are commonly stored in a multi-relational format of interrelated tables. Under this relational model, exploratory data analysis can be done by using relational queries. As an example, in the Internet Movie DataBase (IMDb) a query can be used to check whether the average rank of...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Mechanisms of Reducing Reauthetication Delay on IEEE 802.11 WLANs

    In this paper, the authors present of mechanisms for reducing re-authentication delay in Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Networks (WLAN). They survey some common re-authentication methods e.g. 802.11r and ERP and they compare the methods' efficiency. The focus is in managed networks, where client...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    A Comparison of Mobile Payment Procedures in Finnish and Chinese Markets

    Researchers are particularly interested in factors that affect the adoption, innovations and diffusion of mobile payment, which is a typical and wide application of ICTS (Information Communication Technology Services) in developed and developing countries. Though mobile payment is an exciting domain and rapidly evolved in recent years, the existence of...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Mobile Agent Based Architecture for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) has emerged as one of the key growth areas for wireless networking and computing technologies. Usually in sensor networking, traditional client-server computing architecture is employed where data at multiple nodes is transferred to a processing element. In the mobile-agent based computing paradigm, the motto is to...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2009

    The ONE Simulator for DTN Protocol Evaluation

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2007

    SAS-Based Group Authentication and Key Agreement Protocols

    New trends in consumer electronics have created a strong demand for fast, reliable and user-friendly key agreement protocols. However, many key agreement protocols are secure only against passive at-tacks. Therefore, message authentication is often unavoidable in order to achieve security against active adversaries. The researchers were the first to propose...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2007

    A Method for B2B Process Design and Implementation

    Starting from the practical needs of one case company and assumed scenario of implementing a Business-To-Business (B2B) process, the authors explored business process management from business process (re)design viewpoint and from business process support and automation implementation viewpoint. The main result of their paper is a new method for B2B...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    From Quality of Service to Quality of Experience

    This paper gives detail of the Dagstuhl Seminar 09192 on "From Quality of Service to Quality of Experience " held in Schloss Dagstuhl, Leibniz Center for Informatics from May 05 to May 08, 2009. The seminar was organized with a view to discuss the change in the notion of Quality...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    Requirements On Unique Identifiers For Managing Product Lifecycle Information - Comparison Of Alternative Approaches

    Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. The main difficulty is to maintain a communication link between the product item and its associated information as the product item moves over organizational borders and between different users. As network...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    MOBNET: The Design and Implementation of a Network Mobility Testbed for NEMO Protocol

    The inherent difficulty in faithfully modeling wireless channel characteristics in simulators has prompted researchers to build wireless network testbeds for realistic testing of protocols. While previous testbeds are mostly designed to provide a research environment of static wireless networks, the paper is aimed to assess protocols used for mobile wireless...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparison Between Security Solutions in Cloud and Grid Computing

    This paper helps Grid and Cloud system administrators and researchers to have a clear definition about Grid and Cloud computing and also wants to give clear differences between Cloud and Grid computing, define which the main security issues to be considered are, and how some of these security issues are...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Strong Authentication With Mobile Phones

    Many of the services that people use daily, for example banking, have transformed from traditional customer services into Internet services. In important services, such as the banking, a strong authentication is needed to protect both the users of the services and the service providers. Due very rapid technical progress mobile...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparing Various Realizations of the Cloud Computing Paradigm

    Cloud Computing is becoming attractive these days. Many big companies, such as Google, Amazon and IBM, have promoted their own cloud computing platforms for customers to deploy their web applications on these platforms. Besides some existing security risks for a traditional web server hosting company, some new security vulnerabilities appear...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2010

    A Long-Tail Model of Mobile Application Usage

    In management research, the long tail phenomenon is typically linked to the long-tail of product demand distribution, particularly under electronic distribution, storing and consumption of content. This paper discusses the role of open mobile software platforms in creating a market for niche mobile applications. Open software platforms of smartphones facilitate...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    A Comparison of Mobile Payment Procedures in Finnish and Chinese Markets

    Researchers are particularly interested in factors that affect the adoption, innovations and diffusion of mobile payment, which is a typical and wide application of ICTS (Information Communication Technology Services) in developed and developing countries. Though mobile payment is an exciting domain and rapidly evolved in recent years, the existence of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    MMS (Multimedia Messaging Service) Enabled Web Map Dispatching Solution for Location Enhanced Fieldwork Management

    Field workers, such as service men, perform every day many different tasks at different locations. Work-orders can be in well-known locations, e.g. weekly checks. But most service companies get work orders also as an alert in places where service men have not visited frequently or ever. In such cases navigation...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Grid Computing Aptitude of Well-Known Charity or Other Non-Profit Organizations

    Grid computing is a form of distributed computing where a centralized client computer distributes computations among a large number of server computers. There exists several grid computing projects that utilize computers of home users for applications that require a great amount of computing resources. The authors consider two charity and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Real-Time Transport Protocol (RTP) Security

    This paper describes the Real-time Transport Protocol (RTP). The emphasis is on the security features like confidentiality, integrity and authentication. RTP security features are critically commented and alternative arrangements with their security implications are presented. RTP security is also discussed on multi protocol context where some of RTP's security services...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Implementing an SPKI Certificate Repository Within the DNS

    Authorization certificates can be used to grant access rights from the owner of a resource to other entities and then to further share these rights with others using delegation. However, when access decisions are made, the delegated rights will not be acknowledged unless all the certificates iii the delegation chain...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    User-Centered Design of Secure Software

    With the advance of electronic commerce and other networked services there is a growing need for easy to use secure software. The problem with the security features and applications in much of today's software is that it is very technology-oriented. In order to correctly use it a basic knowledge of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems

    In distributed systems, the access control mechanism in is often modeled after stand-alone solutions, such as A CLs. Such arrangement, however, is not ideal as the system may be mirrored around the world and maintaining the A CLs becomes a problem. A new approach to this problem is using authorisation...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Impact of Size-Based Scheduling on Flow Level Performance in Wireless Downlink Data Channels

    The authors analyze the impact of size-based scheduling on the flow level performance of elastic traffic in wireless downlink data channels. The impact is assessed by comparing the flow level delay of the simple RR scheduler to two optimized non-anticipating schedulers (FB and FBffi) and SRPT. The optimized distance-aware scheduler...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Mobile Agent Based Architecture for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) has emerged as one of the key growth areas for wireless networking and computing technologies. Usually in sensor networking, traditional client-server computing architecture is employed where data at multiple nodes is transferred to a processing element. In the mobile-agent based computing paradigm, the motto is to...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Mechanisms of Reducing Reauthetication Delay on IEEE 802.11 WLANs

    In this paper, the authors present of mechanisms for reducing re-authentication delay in Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Networks (WLAN). They survey some common re-authentication methods e.g. 802.11r and ERP and they compare the methods' efficiency. The focus is in managed networks, where client...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2011

    Energy-Efficient Parallel Software for Mobile Hand-Held Devices

    Energy efficiency is an essential design criterion for mobile hand-held devices. The authors underline the issue that parallel programs for mobile devices must be efficiently executable on the development platforms in addition to their efficient execution on the target hardware. Further, they argue that with the proliferation of increasingly complex...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Influence of Antenna Radiation Pattern on Accuracy of ToA Estimation

    Ultra-WideBand (UWB) signals have very large bandwidth which allow accurate ranging using time domain techniques. Precise UWB ranging requires accurate estimation of Time of Arrival (ToA). Several schemes have been reported for ToA estimation. Among these schemes, the threshold based ToA estimators have attracted interest due to simplicity of its...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Running an i3 Overlay Network on Top of AODV

    Mobile Ad hoc NETworks (MANETs) and Peer-To-Peer (P2P) overlay networks share many key features. Both can be viewed as decentralized self-organizing networks. Both usually have flat address spaces and their network topologies may change in unpredictable ways. Therefore there has lately been a lot of interest in how to take...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2012

    Peer-to-Peer Communication

    Internet has changed a lot since its early days. At the beginning, goal of the Internet was to share computing resources between universities and scientists. In those days communication happened almost completely directly between computers or people. This is something the authors now call peer-to-peer communication. After the commercialization of...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Privacy Challenges of Open APIs: Case LBS

    Many of the most popular Location-Based Services (LBSs) have recently released open APIs for developers in order to extend their services to third party applications. With this strategy, LBSs try to exploit to the maximum the value of location information by helping the fast development of specific context-aware applications involving...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2009

    The ONE Simulator for DTN Protocol Evaluation

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2010

    Forwarding Anomalies in Bloom Filter Based Multicast

    Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-flow state is required in the routers and because routing decisions can be made efficiently by simply checking for the presence of outbound links in the filter. Yet,...

    Provided By Helsinki University of Technology

  • White Papers // May 2010

    Clustering Malware Executables

    Traditional signature based malware detection can easily be evaded by doing small changes to the malware code or le. As each new instance of the malware is slightly different, it becomes challenging to detect which malware les are part of the same family. An alternative approach to signature based detections...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    Matching Service Strategies, Business Models and Modular Business Processes

    In recent decades, supply chains have diverged and new types of services and operators have emerged in the logistics sector. This paper focused on analyzing service strategies and service-related business models, as well as their modular business processes in logistic services. The aims are to describe these three levels and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2007

    A Method for B2B Process Design and Implementation

    Starting from the practical needs of one case company and assumed scenario of implementing a Business-To-Business (B2B) process, the authors explored business process management from business process (re)design viewpoint and from business process support and automation implementation viewpoint. The main result of their paper is a new method for B2B...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Build Mobile Phone Connectivity Over IP Networks

    Connecting two mobile phones through IP networks is challenging since mobile phones usually don't have a specific IPv4 address and connected through NATs and firewalls. Various methods can be used to build up connections for mobile devices over IP networks, such as Teredo, IPsec tunneling, OpenVPN, ICE, STUN and TURN....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Access Control Based on Content

    Internet has become a significant platform for sharing personal information and opinions. Web-Based Social Networks (WBSN) are rapidly getting more users to their community, and unfortunately these users are usually not aware of the privacy risks related to sharing personal content. Current access control mechanisms in WBSNs rely heavily on...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Query Significance in Databases Via Randomizations

    Many sorts of structured data are commonly stored in a multi-relational format of interrelated tables. Under this relational model, exploratory data analysis can be done by using relational queries. As an example, in the Internet Movie DataBase (IMDb) a query can be used to check whether the average rank of...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Energy-Adaptive Scheduling and Queue Management in Wireless LAN Mesh Networks

    Energy efficiency is of critical importance in future wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. The authors present a novel cross-layer energy-adaptive scheduling and queue management framework EAED (Energy Aware Early Detection) for minimizing energy consumption in WLAN mesh networks. EAED...

    Provided By Helsinki University of Technology

  • White Papers // Aug 2009

    Cache-Timing Template Attacks

    Cache-timing attacks are a serious threat to security-critical software. The authors show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. They demonstrate its effectiveness...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2007

    SAS-Based Group Authentication and Key Agreement Protocols

    New trends in consumer electronics have created a strong demand for fast, reliable and user-friendly key agreement protocols. However, many key agreement protocols are secure only against passive at-tacks. Therefore, message authentication is often unavoidable in order to achieve security against active adversaries. The researchers were the first to propose...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy Over IPv4 and IPv6 Networks

    The Host Identity Protocol (HIP) is an internetworking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This...

    Provided By Helsinki University of Technology