Politecnico di Torino

Displaying 1-40 of 109 results

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Secure Broadcast with One-Time Signatures in Controller Area Networks

    Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose, the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. They use an enhancement...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Feb 2012

    Broadcast Authentication in a Low Speed Controller Area Network

    Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational...

    Provided By Politecnico di Torino

  • White Papers // Dec 2011

    Knowledge Applications Solutions at the SME Level in the E-Enterprise Business Intelligence

    The paper presents the knowledge management and business, intelligent concepts in order to analyze enterprise internal and external resources based on the knowledge transfer and capitalization processes. The virtual enterprise business network purposed solution expect to improve Small and Medium-sized Enterprises (SMEs) involvement in new product manufacturing networking efforts in...

    Provided By Politecnico di Torino

  • White Papers // Oct 2011

    Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

    Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Bounds on QoS-Constrained Energy Savings in Cellular Access Networks With Sleep Modes

    Sleep modes are emerging as a promising technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Switch-Off Transients in Cellular Access Networks With Sleep Modes

    The introduction of sleep modes in the operations of base stations is today considered one of the most promising approaches to reduce the energy consumption of cellular access networks. Several papers have considered this option, assuming that the switch-on and switch-off transients are of negligible duration. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Passive Characterization of SopCast Usage in Residential ISPs

    In this paper, the authors present an extensive analysis of traffic generated by SopCast users and collected from operative networks of three national ISPs in Europe. After more than a year of continuous monitoring, they present results about the popularity of SopCast which is the largely preferred application in the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

    Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Investigating Overlay Topologies and Dynamics of P2P-TV Systems: the Case of SopCast

    Several successful commercial P2P-TV applications are already available. Unfortunately, some algorithms and protocols they adopt are unknown, since many follow a closed and proprietary design. This calls for tools and methodologies that allow the investigation of the application behavior. In this paper, the authors present a novel approach to analyze...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Design and Control of Next Generation Distribution Frames

    Today, the permutation of circuits in the Main Distribution Frames (MDF), which connect the subscriber lines to POTS and to DSLAMs, is still operated manually. However, new market regulations, allowing subscribers to change network operator frequently, and the new schemes to concentrate active ADSL users into few DSLAMs during off-peak...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Application of System Dynamics Model and GIS in Sustainability Assessment of Urban Residential Development

    Considering rapid population growth and urbanization, sustainability assessment of residential development has become increasingly necessary for understanding environmental impacts and supporting urban planning. In this paper, due to the urban activities cause impacts not only on local level but also a broader scale, a simulation model, using System Dynamics (SD)...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Experiences of Internet Traffic Monitoring With Tstat

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users' activities. In this paper, the authors present their experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Mining Unclassified Traffic Using Automatic Clustering Techniques

    In this paper, the authors present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters. The signatures used for clustering are statistical representations of the application layer...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Modeling Sleep Modes Gains With Random Graphs

    Nowadays two main approaches are being pursued to reduce energy consumption of network devices: the use of sleep modes in which devices can be put in low-power state, and the adoption of energy proportional approaches where the device architecture is designed to make energy consumption proportional to the actual load....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    10-year Experience of Internet Traffic Monitoring With Tstat

    Network monitoring has always played a key role in understanding telecommunication networks since the pioneering time of the Internet. Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Hybrid Bitrate/PSNR Control for H.264 Video Streaming to Roaming Users

    In wireless communications, the available throughput depends on several parameters, like physical layer, base station distance, fading and interference. Users experience changes in bandwidth within a cell and among same-technology cells, but also among different networks. Moreover, in case of video transmission, the user may specify a desired quality level....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Variable Time-Scale Streaming for Multimedia Transmission Over IP Networks

    Multimedia applications over IP networks are currently at the center of an extraordinary deal of attention. However, for this appealing class of applications to succeed, several major problems need to be solved. Among them, perhaps the most challenging one is how to best deal with the strongly time-varying nature of...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Variable Time-Scale Audio Streaming Over 802.11 Inter-Vehicular Ad-Hoc Networks

    This paper presents an analysis of audio streaming in an inter-vehicular network based on 802.11b wireless devices. In such a scenario characterized by strong link availability variations, the authors investigate the performance of an adaptive packet scheduling policy that adapts the inter-packet transmission interval to the channel conditions. Network simulations...

    Provided By Politecnico di Torino

  • White Papers // May 2010

    Mapping a Fuzzy Logic Approach for QoS-Aware Service Selection on Current Web Service Standards

    The authors propose FQ (Fuzzy-QoS), a complete architecture for including user preferences and Quality of Service characteristics in the selection process of web services. Besides the flexibility of the selection and ranking algorithm, the authors consider of equal importance the properties of the implementation: compliance with standards, backwards compatibility and...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them...

    Provided By Politecnico di Torino

  • White Papers // Feb 2012

    Broadcast Authentication in a Low Speed Controller Area Network

    Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

    Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with...

    Provided By Politecnico di Torino

  • White Papers // Dec 2009

    A Formal Approach for Automated Reasoning About Off-Line and Undetectable On-Line Guessing

    Starting from algebraic properties that enable guessing low-entropy secrets, the authors formalize guessing rules for symbolic verification. The rules are suited for both o -line and on-line guessing and can distinguish between them. They add their guessing rules as state transitions to protocol models that are input to model checking...

    Provided By Politecnico di Torino

  • White Papers // Oct 2011

    Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

    Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Secure Broadcast with One-Time Signatures in Controller Area Networks

    Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose, the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. They use an enhancement...

    Provided By Politecnico di Torino

  • White Papers // Dec 2010

    Augmenting a Webmail Application with Cryptographic Puzzles to Deflect Spam

    In order to increase the resilience against spam, the authors design and implement a protocol based on cryptographic puzzles for an open-source web based e-mail client. Their proposal is compatible with existing e-mail infrastructure and does not require modifications on the server side. The only add-on is a stand-alone ticketing...

    Provided By Politecnico di Torino

  • White Papers // Jul 2009

    A Calculus to Detect Guessing Attacks

    The authors present a calculus for detecting guessing attacks, based on oracles that instantiate cryptographic functions. Adversaries can ob-serve oracles, or control them either on-line or off-line. These relations can be established by protocol analysis in the presence of a Dolev-Yao intruder, and the derived guessing rules can be used...

    Provided By Politecnico di Torino

  • White Papers // Feb 2009

    Towards Developing Secure Video Surveillance Systems Over IP

    A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a...

    Provided By Politecnico di Torino

  • White Papers // Aug 2006

    Construction Techniques for One-Way Chains and Their Use in Authentication

    Authentication is one of the most important security objectives. The use of one-way chains in authentication was proved to be a very successful technique which encountered applications even in constrained environments such as ah-hoc sensor networks. This paper surveys some of the most efficient construction techniques for one-way chains and...

    Provided By Politecnico di Torino

  • White Papers // Apr 2006

    On Cryptographic Chained Puzzles

    Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper, the authors introduce the concept of chained puzzles and they define two kinds of chained puzzles: linearly chained puzzles and randomly chained puzzles. These construnstions prove to be very useful in some scenarios, from which...

    Provided By Politecnico di Torino

  • White Papers // Feb 2007

    Using One-Way Chains to Provide Message Authentication without Shared Secrets

    In this paper, the authors propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret and by using only one-way chains. Such a protocol may have many applications and may be of interest especially in constrained environments where computational power...

    Provided By Politecnico di Torino

  • White Papers // Apr 2007

    Implementation of an Authentication Protocol for Sending Audio-Video Information in Java

    An application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java media framework to send audio and video information over RTP (Real-time Transport Protocol). In order to guarantee that information is not altered during transmission over public networks by malicious adversaries...

    Provided By Politecnico di Torino

  • White Papers // Jan 2007

    An Extension of the RSA Trapdoor in a KEM/DEM Framework

    Public key cryptosystems are vital primitives for today's information systems security. The basic task in which public key cryptosystems are involved, is in assuring the transfer of some secret information over a channel that is unsecured. In order to achieve this objective a trapdoor one-way function can be used. Although...

    Provided By Politecnico di Torino

  • White Papers // Aug 2010

    Optimizing Deep Packet Inspection for High-Speed Traffic Analysis

    Deep Packet Inspection (DPI) techniques are considered extremely expensive in terms of processing costs and therefore are usually deployed in edge networks, where the amount of data to be processed is limited. This paper demonstrates that, in case the application can tolerate some compromises in terms of accuracy (such as...

    Provided By Politecnico di Torino

  • White Papers // Jun 2010

    SPAF: Stateless FSA-Based Packet Filters

    The authors propose a stateless packet filtering technique based on Finite-State Automata (FSA). FSAs provide a comprehensive framework with well-defined composition operations that enable the generation of stateless filters from high-level specifications and their compilation into efficient executable code without resorting to various opportunistic optimization algorithms. In contrast with most...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Nov 2010

    Reliable SPARQL Queries With Consistent Results Over P2P-Shared RDF Storage

    One aim of the semantic web is to build large knowledge bases distributed over the internet. Knowledge management systems that gather, merge and make available the information physically stored in multiple locations suffer from consistency and data fragmentation issues due to node failures. In this paper the authors address such...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Jun 2010

    Distributed Semantic Video Tagging for Peer-to-Peer Authoring System

    The paper is aimed at the development of a cooperative and distributed Authoring System to facilitate the production, sharing, and integration of new and existing content from various domains, this paper addresses problems related to locating, annotating and reusing audio and video streams distributed over the Internet. The Authoring System...

    Provided By Politecnico di Torino

  • White Papers // Mar 2009

    Perceptual Based Voice Multi-Hop Transmission Over Wireless Sensor Networks

    Multimedia applications over Wireless Sensor Networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services such as environmental video monitoring and emergency speech calls. In this paper the authors analyze the possibility of sending voice using a network of wireless tiny...

    Provided By Politecnico di Torino

  • White Papers // Apr 2009

    Error Resilient Real-Time Multimedia Streaming Over Vehicular Networks

    This paper focuses on the optimized transmission of multimedia sequences over Vehicular Ad-hoc NETworks (VANETs). Among the main drawbacks of the high node mobility of the vehicular scenario are the high channel loss rate, burst length and intermittent connectivity. To allow real-time streaming of media sequences in such a scenario,...

    Provided By Politecnico di Torino

  • White Papers // Apr 2009

    Rate-Distortion Optimized H.264/mvc Video Communications Over Qos-Enabled Networks

    This paper presents a rate-distortion optimized framework for the transmission of stereoscopic H.264/MVC video on QoS-enabled networks. The distortion caused by the loss of each encoding unit is computed by means of the analysis-by-synthesis approach, which is then used within a rate-distortion optimization framework to select the best transmission strategy....

    Provided By Politecnico di Torino

  • White Papers // Feb 2009

    Content-Adaptive Robust H.264/SVC Video Communications Over 802.11e Networks

    In this paper the authors present a low-complexity traffic prioritization strategy for video transmission using the H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. The first part of this work focuses on assessing the perceptual impact of data loss in the various enhancement layers using a wide set...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks

    This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. The H.264/SVC standard is particularly suitable for wireless communications because of its compression efficiency and the ability to adapt to different network scenarios. The adoption...

    Provided By Politecnico di Torino