Université Mohammed 1er

Displaying 1-6 of 6 results

  • White Papers // Apr 2013

    Network Access Control Technology

    Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats the authors need more integrated information security solution. To achieve this objective, they will analyze a real-world security platform, and focus on some key components...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2012

    Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC

    Today, Internet offers many critical applications. So, it becomes very crucial for Internet service providers to ensure traceability of operations and to secure data exchange. Since all these communications are based on the use of the Domain Name System (DNS) protocol, it becomes necessary to think to enhance and secure...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2012

    New Hexagonal Geometry in Cellular Network Systems

    Motivated by the existence of two frequency bands and inspired from Lie algebra classification, the authors propose a new geometric cellular shape with double hexagonal structure. Based on a two dimensional root system of the exceptional Lie algebra G2, this cellular network model involves two hexagons of unequal side length...

    Provided By Université Mohammed 1er

  • White Papers // Oct 2010

    Verification of Quantum Cryptography Protocols by Model Checking

    Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2010

    Improving TLS Security by Quantum Cryptography

    Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break...

    Provided By Université Mohammed 1er

  • White Papers // Apr 2010

    Analysis of the Security of Bb84 by Model Checking

    Quantum Cryptography or Quantum Key Distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on...

    Provided By Université Mohammed 1er

  • White Papers // Apr 2013

    Network Access Control Technology

    Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats the authors need more integrated information security solution. To achieve this objective, they will analyze a real-world security platform, and focus on some key components...

    Provided By Université Mohammed 1er

  • White Papers // Apr 2010

    Analysis of the Security of Bb84 by Model Checking

    Quantum Cryptography or Quantum Key Distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2010

    Improving TLS Security by Quantum Cryptography

    Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break...

    Provided By Université Mohammed 1er

  • White Papers // Oct 2010

    Verification of Quantum Cryptography Protocols by Model Checking

    Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2012

    New Hexagonal Geometry in Cellular Network Systems

    Motivated by the existence of two frequency bands and inspired from Lie algebra classification, the authors propose a new geometric cellular shape with double hexagonal structure. Based on a two dimensional root system of the exceptional Lie algebra G2, this cellular network model involves two hexagons of unequal side length...

    Provided By Université Mohammed 1er

  • White Papers // Jul 2012

    Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC

    Today, Internet offers many critical applications. So, it becomes very crucial for Internet service providers to ensure traceability of operations and to secure data exchange. Since all these communications are based on the use of the Domain Name System (DNS) protocol, it becomes necessary to think to enhance and secure...

    Provided By Université Mohammed 1er