Radboud University Nijmegen

Displaying 1-11 of 11 results

  • White Papers // Apr 2011

    Implementing a Non-Strict Purely Functional Language in JavaScript

    This paper describes an implementation of a non-strict purely functional language in JavaScript. This particular implementation is based on the translation of a high-level functional language such as Haskell or Clean into JavaScript via the intermediate functional language Sapl. The resulting code relies on the use of an evaluator function...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2011

    The Identity Crisis Security, Privacy and Usability Issues in Identity Management

    This paper studies the current 'Identity crisis' caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2010

    Short Paper: Privacy-Preserving ECC-Based Grouping Proofs for RFID

    The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially un-trusted. This paper extends this concept and proposes a narrow-strong privacy-preserving RFID grouping proof and demonstrates that it...

    Provided By Radboud University Nijmegen

  • White Papers // Sep 2010

    Testing With Functional Reference Implementations

    This paper discusses the authors' approach to test programs that determine which candidates are elected in the Scottish Single Transferable Vote (STV) elections. Due to the lack of properties suited for model-based testing, the authors have implemented a reference implementation in a pure functional programming language. Their tests revealed issues...

    Provided By Radboud University Nijmegen

  • White Papers // Jun 2010

    Dismantling SecureMemory, CryptoMemory and CryptoRF

    This paper addresses the (in)security of the cryptographic mechanisms used in the Atmel product families SecureMemory, CryptoMemory, and CryptoRF. These products are integrated circuits, consisting essentially of a small piece of memory and have cryptographic capabilities to authenticate and encrypt. They have two main application areas: in smart cards (ID...

    Provided By Radboud University Nijmegen

  • White Papers // May 2010

    Towards Dynamic Workflow Support for Crisis Management

    Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to improve crisis response operations by automating coordination aspects. Unfortunately most contemporary systems can only support static workflows, hence yielding inflexible support...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2010

    Embedding a Web-Based Workflow Management System in a Functional Language

    Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms. These formalisms impose severe restrictions on what can be expressed. Modern workflow management systems should handle intricate data dependencies, offer a web-based interface, and should adapt to...

    Provided By Radboud University Nijmegen

  • White Papers // Feb 2010

    iTasks 2: iTasks for End-Users

    WorkFlow Management Systems (WFMSs) are systems that generate, coordinate and monitor tasks performed by human workers in collaboration with automated (information) systems. The iTask system (iTasks) is a WFMS that uses a combinator language embedded in the pure and lazy functional language Clean for the specification of highly dynamic workflows....

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    A Typical Synergy: Dynamic Types and Generalised Algebraic Datatypes

    The authors present a typical synergy between dynamic types (dynamics) and Generalised Algebraic DataTypes (GADTs). The former provides a clean approach to integrating dynamic typing in a statically typed language. It allows values to be wrapped together with their type in a uniform package, deferring type unification until run time...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    Synthesis of Functions Using Generic Programming

    In this paper, the authors have shown a very general and flexible approach to do inductive programming by a generate and test approach. The user defines the syntax of the functions to be generated by a set of algebraic data types. Using generic programming support the user defines the semantic...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2009

    Full Memory Read Attack on a Java Card

    The authors present a simple attack on a Java Card smart card to perform arbitrary memory reads. The attack utilises a known technique of type confusion of the card's Java Virtual Machine by exploiting the faulty transaction mechanism implementation. The type confusion attack lets them access the application's private meta-data,...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2010

    Short Paper: Privacy-Preserving ECC-Based Grouping Proofs for RFID

    The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially un-trusted. This paper extends this concept and proposes a narrow-strong privacy-preserving RFID grouping proof and demonstrates that it...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2009

    Full Memory Read Attack on a Java Card

    The authors present a simple attack on a Java Card smart card to perform arbitrary memory reads. The attack utilises a known technique of type confusion of the card's Java Virtual Machine by exploiting the faulty transaction mechanism implementation. The type confusion attack lets them access the application's private meta-data,...

    Provided By Radboud University Nijmegen

  • White Papers // Jun 2010

    Dismantling SecureMemory, CryptoMemory and CryptoRF

    This paper addresses the (in)security of the cryptographic mechanisms used in the Atmel product families SecureMemory, CryptoMemory, and CryptoRF. These products are integrated circuits, consisting essentially of a small piece of memory and have cryptographic capabilities to authenticate and encrypt. They have two main application areas: in smart cards (ID...

    Provided By Radboud University Nijmegen

  • White Papers // Sep 2010

    Testing With Functional Reference Implementations

    This paper discusses the authors' approach to test programs that determine which candidates are elected in the Scottish Single Transferable Vote (STV) elections. Due to the lack of properties suited for model-based testing, the authors have implemented a reference implementation in a pure functional programming language. Their tests revealed issues...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    Synthesis of Functions Using Generic Programming

    In this paper, the authors have shown a very general and flexible approach to do inductive programming by a generate and test approach. The user defines the syntax of the functions to be generated by a set of algebraic data types. Using generic programming support the user defines the semantic...

    Provided By Radboud University Nijmegen

  • White Papers // Feb 2010

    iTasks 2: iTasks for End-Users

    WorkFlow Management Systems (WFMSs) are systems that generate, coordinate and monitor tasks performed by human workers in collaboration with automated (information) systems. The iTask system (iTasks) is a WFMS that uses a combinator language embedded in the pure and lazy functional language Clean for the specification of highly dynamic workflows....

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    A Typical Synergy: Dynamic Types and Generalised Algebraic Datatypes

    The authors present a typical synergy between dynamic types (dynamics) and Generalised Algebraic DataTypes (GADTs). The former provides a clean approach to integrating dynamic typing in a statically typed language. It allows values to be wrapped together with their type in a uniform package, deferring type unification until run time...

    Provided By Radboud University Nijmegen

  • White Papers // Apr 2011

    Implementing a Non-Strict Purely Functional Language in JavaScript

    This paper describes an implementation of a non-strict purely functional language in JavaScript. This particular implementation is based on the translation of a high-level functional language such as Haskell or Clean into JavaScript via the intermediate functional language Sapl. The resulting code relies on the use of an evaluator function...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2010

    Embedding a Web-Based Workflow Management System in a Functional Language

    Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms. These formalisms impose severe restrictions on what can be expressed. Modern workflow management systems should handle intricate data dependencies, offer a web-based interface, and should adapt to...

    Provided By Radboud University Nijmegen

  • White Papers // May 2010

    Towards Dynamic Workflow Support for Crisis Management

    Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to improve crisis response operations by automating coordination aspects. Unfortunately most contemporary systems can only support static workflows, hence yielding inflexible support...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2011

    The Identity Crisis Security, Privacy and Usability Issues in Identity Management

    This paper studies the current 'Identity crisis' caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to...

    Provided By Radboud University Nijmegen