Stevens Creek Software LLC

Displaying 1-13 of 13 results

  • White Papers // Jan 2014

    On Efficient Message Authentication Via Block Cipher Design Techniques

    In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, the researchers have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2013

    Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee

    In this paper, the authors focus on the problem of result integrity verification for outsourcing of frequent itemset mining. They design efficient cryptographic approaches that verify whether the returned frequent itemset mining results are correct and complete with deterministic guarantee. The key of their solution is that the service provider...

    Provided By Stevens Creek Software LLC

  • White Papers // Jun 2013

    Broadcast Steganography

    The authors initiate the study of Broadcast Steganography (BS), an extension of steganography to the multi-recipient setting. BS enables a sender to communicate covertly with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain unaware of the covert communication....

    Provided By Stevens Creek Software LLC

  • White Papers // May 2013

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The Data-Mining-as-a-Service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In...

    Provided By Stevens Creek Software LLC

  • White Papers // Jan 2013

    Packet Monitoring at High Speed with FFPF (Technical Report)

    The Fairly Fast Packet Filter (FFPF) is an approach to network packet processing that adds many new features to existing filtering solutions like BPF. FFPF is designed for high speed by pushing computationally intensive tasks to the kernel or even network processors and by minimizing packet copying. By providing both...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2012

    Measuring Systems Security

    Security metrics have evolved side by side with the advent of security tools and techniques. They have been derived from the techniques rather than specified as system requirements. This paper surveys the evolution and state of the practice of security metrics from both a technical and historical perspective. It describes...

    Provided By Stevens Creek Software LLC

  • White Papers // May 2012

    A Network Coding Method for Channel Signatures Based Key Distribution

    To enhance network security, the authors propose a secret key generation and distribution method for multihop wireless OFDM networks. In this method, the inherent physical features of wireless channel signatures, including randomness and reciprocity, are exploited to generate secret keys. In addition, a network coding approach is introduced for key...

    Provided By Stevens Creek Software LLC

  • White Papers // Apr 2012

    Implementation and Performance Evaluation of EAP-TLS-KS

    In this paper, the authors analyze the performance of authentication protocols for roaming in 802.11i-protected WLANs. In particular, they compare the recently introduced EAP-TLSKS protocol to standard configurations in EAP-TLS. Roaming configurations for EAP-TLS are such that all traffic is forwarded to the home network leaving the foreign network no...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2011

    Robust Wireless Localization to Attacks on Access Points

    Trustworthy location information is important because it is a critical input to a wide variety of location-based applications. However, the localization infrastructure is vulnerable to physical attacks and consequently the localization results are affected. In this paper, the authors focus on achieving robust wireless localization when attacks are present on...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2011

    Social Closeness Based Clone Attack Detection for Mobile Healthcare System

    The inclusion of embedded sensors in mobile phones, and the explosion of their usage in people's daily lives provide users with the ability to collectively sense the world. The collected sensing data from such a mobile phone enabled social network can be mined for users' behaviors and their social communities,...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2011

    Collaborative Track Analysis, Data Cleansing, and Labeling

    Tracking output is a very attractive source of labeled data sets that, in turn, could be used to train other systems for tracking, detection, recognition and categorization. In this context, long tracking sequences are of particular importance because they provide richer information, multiple views and wider range of appearances. This...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2009

    Privacy-Preserving Publishing Data with Full Functional Dependencies

    The authors study the privacy threat by publishing data that contains Full Functional Dependencies (FFDs). They show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunately, none of the existing anonymization principles can effectively prevent against the FFD-based privacy attack. In this paper, they formalize the...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2007

    Geometric Integrability and Consistency of 3D Point Clouds

    Presently it is possible to extract 3D point clouds from complex 3D scenes, often at real-time video rates. What are needed automatic and computationally stable methods to extract geometry from noisy non uniform clouds. These methods must handle automatically under-sampled regions, for example, they have to deal with surface boundaries...

    Provided By Stevens Creek Software LLC

  • White Papers // Jan 2013

    Packet Monitoring at High Speed with FFPF (Technical Report)

    The Fairly Fast Packet Filter (FFPF) is an approach to network packet processing that adds many new features to existing filtering solutions like BPF. FFPF is designed for high speed by pushing computationally intensive tasks to the kernel or even network processors and by minimizing packet copying. By providing both...

    Provided By Stevens Creek Software LLC

  • White Papers // May 2012

    A Network Coding Method for Channel Signatures Based Key Distribution

    To enhance network security, the authors propose a secret key generation and distribution method for multihop wireless OFDM networks. In this method, the inherent physical features of wireless channel signatures, including randomness and reciprocity, are exploited to generate secret keys. In addition, a network coding approach is introduced for key...

    Provided By Stevens Creek Software LLC

  • White Papers // Jun 2013

    Broadcast Steganography

    The authors initiate the study of Broadcast Steganography (BS), an extension of steganography to the multi-recipient setting. BS enables a sender to communicate covertly with a dynamically designated set of receivers, so that the recipients recover the original content, while unauthorized users and outsiders remain unaware of the covert communication....

    Provided By Stevens Creek Software LLC

  • White Papers // May 2013

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The Data-Mining-as-a-Service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, however, raises a serious security issue: how can the client of weak computational power verify that the server returned correct mining result? In...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2013

    Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee

    In this paper, the authors focus on the problem of result integrity verification for outsourcing of frequent itemset mining. They design efficient cryptographic approaches that verify whether the returned frequent itemset mining results are correct and complete with deterministic guarantee. The key of their solution is that the service provider...

    Provided By Stevens Creek Software LLC

  • White Papers // Jan 2014

    On Efficient Message Authentication Via Block Cipher Design Techniques

    In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, the researchers have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2009

    Privacy-Preserving Publishing Data with Full Functional Dependencies

    The authors study the privacy threat by publishing data that contains Full Functional Dependencies (FFDs). They show that the cross-attribute correlations by FFDs can bring potential vulnerability to privacy. Unfortunately, none of the existing anonymization principles can effectively prevent against the FFD-based privacy attack. In this paper, they formalize the...

    Provided By Stevens Creek Software LLC

  • White Papers // Apr 2012

    Implementation and Performance Evaluation of EAP-TLS-KS

    In this paper, the authors analyze the performance of authentication protocols for roaming in 802.11i-protected WLANs. In particular, they compare the recently introduced EAP-TLSKS protocol to standard configurations in EAP-TLS. Roaming configurations for EAP-TLS are such that all traffic is forwarded to the home network leaving the foreign network no...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2012

    Measuring Systems Security

    Security metrics have evolved side by side with the advent of security tools and techniques. They have been derived from the techniques rather than specified as system requirements. This paper surveys the evolution and state of the practice of security metrics from both a technical and historical perspective. It describes...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2011

    Collaborative Track Analysis, Data Cleansing, and Labeling

    Tracking output is a very attractive source of labeled data sets that, in turn, could be used to train other systems for tracking, detection, recognition and categorization. In this context, long tracking sequences are of particular importance because they provide richer information, multiple views and wider range of appearances. This...

    Provided By Stevens Creek Software LLC

  • White Papers // Oct 2007

    Geometric Integrability and Consistency of 3D Point Clouds

    Presently it is possible to extract 3D point clouds from complex 3D scenes, often at real-time video rates. What are needed automatic and computationally stable methods to extract geometry from noisy non uniform clouds. These methods must handle automatically under-sampled regions, for example, they have to deal with surface boundaries...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2011

    Robust Wireless Localization to Attacks on Access Points

    Trustworthy location information is important because it is a critical input to a wide variety of location-based applications. However, the localization infrastructure is vulnerable to physical attacks and consequently the localization results are affected. In this paper, the authors focus on achieving robust wireless localization when attacks are present on...

    Provided By Stevens Creek Software LLC

  • White Papers // Dec 2011

    Social Closeness Based Clone Attack Detection for Mobile Healthcare System

    The inclusion of embedded sensors in mobile phones, and the explosion of their usage in people's daily lives provide users with the ability to collectively sense the world. The collected sensing data from such a mobile phone enabled social network can be mined for users' behaviors and their social communities,...

    Provided By Stevens Creek Software LLC