UCL Business PLC

Displaying 1-21 of 21 results

  • White Papers // Sep 2013

    The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive

    Physical Unclonable Functions (PUFs) have demonstrated great potential as fast and robust hardware security primitives. Public physical Unclonable Functions (PPUFs) have removed the main conceptual limitations of PUFs by enabling the creation of public key protocols. Traditional methods of constructing PPUFs leverage intrinsic process variation in submicron integrated circuits. However,...

    Provided By UCL Business PLC

  • White Papers // Aug 2013

    Mobile Micro-Cloud: Application Classification, Mapping, and Deployment

    Mobile micro-cloud envisions a logical network composed of two components, the core (e.g., the command and control center) - with access to large quantities of static (and possibly stale) information and the edge (e.g., the forward operating base) - with access to smaller quantities of more real-time and dynamic data....

    Provided By UCL Business PLC

  • White Papers // May 2013

    Modeling Mobile Cloud Computing Using Greenmetrics

    Although a mobile cloud computing paradigm has obtained significant attentions from research community, the authors note that most of work is based on an ad hoc fashion. Furthermore, little work has shown a model-based cost optimization of offloading. Mobile cloud computing may instead be holistically analyzed and systematically designed as...

    Provided By UCL Business PLC

  • White Papers // Mar 2013

    The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    With the increasing availability of public cloud computing facilities and scientific super computers, there is a great potential for making R available through public or shared resources. This allows researchers to efficiently run code requiring a lot of cycles and memory, or embed R functionality into e.g. systems or web...

    Provided By UCL Business PLC

  • White Papers // Feb 2013

    Inconspicuous Personal Computer Protection with Touch-Mouse

    The authors present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touch-mouse under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pres-sure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action...

    Provided By UCL Business PLC

  • White Papers // Jan 2013

    Integrated Modeling and Generation of a Reconfigurable Network-On-Chip

    While a communication network is a critical component for an efficient system-on-chip multiprocessor, there are few approaches available to help with system-level architectural exploration of such a specialized interconnection network. In this paper, the authors present an integrated modeling, simulation and implementation tool. A high level description of a network-on-chip...

    Provided By UCL Business PLC

  • White Papers // Aug 2012

    Designing Rating Systems to Promote Mutual Security for Interconnected Networks

    Interconnected Autonomous Systems (ASs) often share security risks. However, an AS lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, the authors develop a systematic and rigorous framework for analyzing and significantly improving...

    Provided By UCL Business PLC

  • White Papers // Mar 2012

    Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving

    PHP web applications routinely generate invalid HTML. Modern browsers silently correct HTML errors, but sometimes malformed pages render inconsistently, cause browser crashes, or expose security vulnerabilities. Fixing errors in generated pages is usually straightforward, but repairing the generating PHP program can be much harder. The authors observe that malformed HTML...

    Provided By UCL Business PLC

  • White Papers // Feb 2012

    Fuzzy Identity Based Encryption from Lattices

    Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this paper, the authors...

    Provided By UCL Business PLC

  • White Papers // Nov 2011

    Graph-Based Codes for Quantize-Map-and-Forward Relaying

    Quantize-Map-and-Forward (QMF) is a recently proposed strategy that allows to approximately achieve the capacity of arbitrary wireless relay networks. The authors present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks that employ LDPC ensembles for the node operations and message-passing algorithms for decoding. They demonstrate through extensive...

    Provided By UCL Business PLC

  • White Papers // Oct 2011

    On the Security of Interferometric Quantum Key Distribution

    Photonic quantum key distribution is commonly implemented using interferometers, devices that inherently cause the addition of vacuum ancillas, thus enlarging the quantum space in use. This enlargement sometimes exposes the implemented protocol to new kinds of attacks that have not yet been analyzed. The authors consider several quantum key distribution...

    Provided By UCL Business PLC

  • White Papers // May 2011

    Secrecy Using Compressive Sensing

    The area of compressive sensing has seen an explosion of interest in the last few years, finding wide ranging applications from data mining to computer vision. This paper uses the compressive sensing framework to establish secure physical layer communication over a Wyner wiretap channel. The idea, at its core, is...

    Provided By UCL Business PLC

  • White Papers // Dec 2008

    Computing on Encrypted Data

    Encryption secures the authors' stored data but seems to make it inert. Can they process encrypted data without having to decrypt it first? Answers to this fundamental question give rise to a wide variety of applications. Here, they explore this question in a number of settings, focusing on how interaction...

    Provided By UCL Business PLC

  • White Papers // Sep 2008

    Public-Key Locally-Decodable Codes

    In this paper, the authors introduce the notion of a Public-Key Encryption (PKE) scheme that is also a locally-decodable error-correcting code. In particular, they allow any polynomial-time adversary to read the entire ciphertext, and corrupt a constant fraction of the bits of the entire ciphertext. Nevertheless, the decoding algorithm can...

    Provided By UCL Business PLC

  • White Papers // Sep 2008

    Public Key Encryption That Allows PIR Queries

    Consider the following problem: Alice wishes to maintain her email using a storage-provider Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should provide for Alice the ability to collect, retrieve, search and delete emails but, at the same time, should learn neither the content of messages sent...

    Provided By UCL Business PLC

  • White Papers // Aug 2008

    Founding Cryptography on Oblivious Transfer - Efficiently

    The authors present a simple and efficient compiler for transforming secure Multi-Party Computation (MPC) protocols that enjoy security only with an honest majority into MPC protocols that guarantee security with no honest majority, in the Oblivious-Transfer (OT) hybrid model. Their technique works by combining a secure protocol in the honest...

    Provided By UCL Business PLC

  • White Papers // Jul 2008

    Bounded Ciphertext Policy Attribute Based Encryption

    In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing the user) and an encrypted ciphertext will specify an access policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the ciphertext's policy....

    Provided By UCL Business PLC

  • White Papers // Dec 2007

    Basing Weak Public-Key Cryptography on Strong One-Way Functions

    In one of the pioneering papers on public-key cryptography, Ralph Merkle suggested a heuristic protocol for exchanging a secret key over an insecure channel by using an idealized private-key encryption scheme. Merkle's protocol is presumed to remain secure as long as the gap between the running time of the adversary...

    Provided By UCL Business PLC

  • White Papers // Apr 2007

    Non-Malleable Encryption: Equivalence Between Two Notions, and an Indistinguishability-Based Characterization

    The authors prove the equivalence of two definitions of non-malleable encryption appearing in the literature| the original one of Dolev, Dwork and Naor and the later one of Bellare, Desai, Pointcheval and Rogaway. The equivalence relies on a new characterization of non-malleable en-cryption in terms of the standard notion of...

    Provided By UCL Business PLC

  • White Papers // Jan 2007

    From Social Insecurity to Social Security: The Genius of Democratic Politics

    Social security is one of the least understood of all government policies. Modern attempts to 'Save' the US social security system are futile. Any such unfunded system has already provided an intergenerational redistribution to the founding elders from subsequent generations. Starting from an initial perfectly competitive equilibrium, these later generations...

    Provided By UCL Business PLC

  • White Papers // Sep 2006

    Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures

    Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. The authors suggest several NIZK proof systems based on prime order groups with a bilinear map. They obtain linear size proofs for relations among group elements without going through an expensive reduction to an NP-complete language such as circuit...

    Provided By UCL Business PLC

  • White Papers // Mar 2012

    Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving

    PHP web applications routinely generate invalid HTML. Modern browsers silently correct HTML errors, but sometimes malformed pages render inconsistently, cause browser crashes, or expose security vulnerabilities. Fixing errors in generated pages is usually straightforward, but repairing the generating PHP program can be much harder. The authors observe that malformed HTML...

    Provided By UCL Business PLC

  • White Papers // Sep 2008

    Public Key Encryption That Allows PIR Queries

    Consider the following problem: Alice wishes to maintain her email using a storage-provider Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should provide for Alice the ability to collect, retrieve, search and delete emails but, at the same time, should learn neither the content of messages sent...

    Provided By UCL Business PLC

  • White Papers // Sep 2008

    Public-Key Locally-Decodable Codes

    In this paper, the authors introduce the notion of a Public-Key Encryption (PKE) scheme that is also a locally-decodable error-correcting code. In particular, they allow any polynomial-time adversary to read the entire ciphertext, and corrupt a constant fraction of the bits of the entire ciphertext. Nevertheless, the decoding algorithm can...

    Provided By UCL Business PLC

  • White Papers // Dec 2008

    Computing on Encrypted Data

    Encryption secures the authors' stored data but seems to make it inert. Can they process encrypted data without having to decrypt it first? Answers to this fundamental question give rise to a wide variety of applications. Here, they explore this question in a number of settings, focusing on how interaction...

    Provided By UCL Business PLC

  • White Papers // May 2011

    Secrecy Using Compressive Sensing

    The area of compressive sensing has seen an explosion of interest in the last few years, finding wide ranging applications from data mining to computer vision. This paper uses the compressive sensing framework to establish secure physical layer communication over a Wyner wiretap channel. The idea, at its core, is...

    Provided By UCL Business PLC

  • White Papers // Sep 2013

    The Bidirectional Polyomino Partitioned PPUF as a Hardware Security Primitive

    Physical Unclonable Functions (PUFs) have demonstrated great potential as fast and robust hardware security primitives. Public physical Unclonable Functions (PPUFs) have removed the main conceptual limitations of PUFs by enabling the creation of public key protocols. Traditional methods of constructing PPUFs leverage intrinsic process variation in submicron integrated circuits. However,...

    Provided By UCL Business PLC

  • White Papers // Feb 2013

    Inconspicuous Personal Computer Protection with Touch-Mouse

    The authors present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touch-mouse under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pres-sure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action...

    Provided By UCL Business PLC

  • White Papers // Jul 2008

    Bounded Ciphertext Policy Attribute Based Encryption

    In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing the user) and an encrypted ciphertext will specify an access policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the ciphertext's policy....

    Provided By UCL Business PLC

  • White Papers // Feb 2012

    Fuzzy Identity Based Encryption from Lattices

    Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this paper, the authors...

    Provided By UCL Business PLC

  • White Papers // Apr 2007

    Non-Malleable Encryption: Equivalence Between Two Notions, and an Indistinguishability-Based Characterization

    The authors prove the equivalence of two definitions of non-malleable encryption appearing in the literature| the original one of Dolev, Dwork and Naor and the later one of Bellare, Desai, Pointcheval and Rogaway. The equivalence relies on a new characterization of non-malleable en-cryption in terms of the standard notion of...

    Provided By UCL Business PLC

  • White Papers // Jan 2007

    From Social Insecurity to Social Security: The Genius of Democratic Politics

    Social security is one of the least understood of all government policies. Modern attempts to 'Save' the US social security system are futile. Any such unfunded system has already provided an intergenerational redistribution to the founding elders from subsequent generations. Starting from an initial perfectly competitive equilibrium, these later generations...

    Provided By UCL Business PLC

  • White Papers // Aug 2013

    Mobile Micro-Cloud: Application Classification, Mapping, and Deployment

    Mobile micro-cloud envisions a logical network composed of two components, the core (e.g., the command and control center) - with access to large quantities of static (and possibly stale) information and the edge (e.g., the forward operating base) - with access to smaller quantities of more real-time and dynamic data....

    Provided By UCL Business PLC

  • White Papers // Oct 2011

    On the Security of Interferometric Quantum Key Distribution

    Photonic quantum key distribution is commonly implemented using interferometers, devices that inherently cause the addition of vacuum ancillas, thus enlarging the quantum space in use. This enlargement sometimes exposes the implemented protocol to new kinds of attacks that have not yet been analyzed. The authors consider several quantum key distribution...

    Provided By UCL Business PLC

  • White Papers // Aug 2012

    Designing Rating Systems to Promote Mutual Security for Interconnected Networks

    Interconnected Autonomous Systems (ASs) often share security risks. However, an AS lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, the authors develop a systematic and rigorous framework for analyzing and significantly improving...

    Provided By UCL Business PLC

  • White Papers // Mar 2013

    The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    With the increasing availability of public cloud computing facilities and scientific super computers, there is a great potential for making R available through public or shared resources. This allows researchers to efficiently run code requiring a lot of cycles and memory, or embed R functionality into e.g. systems or web...

    Provided By UCL Business PLC

  • White Papers // Jan 2013

    Integrated Modeling and Generation of a Reconfigurable Network-On-Chip

    While a communication network is a critical component for an efficient system-on-chip multiprocessor, there are few approaches available to help with system-level architectural exploration of such a specialized interconnection network. In this paper, the authors present an integrated modeling, simulation and implementation tool. A high level description of a network-on-chip...

    Provided By UCL Business PLC

  • White Papers // Nov 2011

    Graph-Based Codes for Quantize-Map-and-Forward Relaying

    Quantize-Map-and-Forward (QMF) is a recently proposed strategy that allows to approximately achieve the capacity of arbitrary wireless relay networks. The authors present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks that employ LDPC ensembles for the node operations and message-passing algorithms for decoding. They demonstrate through extensive...

    Provided By UCL Business PLC

  • White Papers // May 2013

    Modeling Mobile Cloud Computing Using Greenmetrics

    Although a mobile cloud computing paradigm has obtained significant attentions from research community, the authors note that most of work is based on an ad hoc fashion. Furthermore, little work has shown a model-based cost optimization of offloading. Mobile cloud computing may instead be holistically analyzed and systematically designed as...

    Provided By UCL Business PLC

  • White Papers // Dec 2007

    Basing Weak Public-Key Cryptography on Strong One-Way Functions

    In one of the pioneering papers on public-key cryptography, Ralph Merkle suggested a heuristic protocol for exchanging a secret key over an insecure channel by using an idealized private-key encryption scheme. Merkle's protocol is presumed to remain secure as long as the gap between the running time of the adversary...

    Provided By UCL Business PLC

  • White Papers // Sep 2006

    Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures

    Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. The authors suggest several NIZK proof systems based on prime order groups with a bilinear map. They obtain linear size proofs for relations among group elements without going through an expensive reduction to an NP-complete language such as circuit...

    Provided By UCL Business PLC

  • White Papers // Aug 2008

    Founding Cryptography on Oblivious Transfer - Efficiently

    The authors present a simple and efficient compiler for transforming secure Multi-Party Computation (MPC) protocols that enjoy security only with an honest majority into MPC protocols that guarantee security with no honest majority, in the Oblivious-Transfer (OT) hybrid model. Their technique works by combining a secure protocol in the honest...

    Provided By UCL Business PLC