University of California, Irvine

Displaying 1-38 of 38 results

  • White Papers // Feb 2014

    Minimizing Clock Domain Crossing in Network on Chip Interconnect

    Network-on-Chip (NoC) architectures have been widely adopted as the preferred solution to the communication challenges of System-on-Chip (SoC) design in the nanoscale regime. SoC designs often incorporate custom NoC architectures that do not conform to regular topologies. This requires the generation of a power and resource efficient interconnection architecture that...

    Provided By University of California, Irvine

  • White Papers // Jan 2014

    Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks

    Providing security support for mobile ad-hoc networks is challenging for several reasons: wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional break-ins by adversaries may be inevitable in a large time window; mobile users demand \"Anywhere, anytime\" services; a scalable solution is needed for a...

    Provided By University of California, Irvine

  • White Papers // Sep 2013

    On the Power of Public-Key Encryption in Secure Computation

    Public-Key Encryption (PKE) is an important security primitive in a system involving more than two parties. In this paper, the authors ask if PKE could be useful for protecting two mutually distrusting parties against each other, if there is no other party involved. They qualitatively separate semi-honest secure computation of...

    Provided By University of California, Irvine

  • White Papers // Jul 2013

    MrCrypt: Static Analysis for Secure Cloud Computations

    In a common use case for cloud computing, clients upload data and computation to servers that are managed by a third-party infrastructure provider. The authors describe MrCrypt, a system that provides data confidentiality in this setting by executing client computations on encrypted data. MrCrypt statically analyzes a program to identify...

    Provided By University of California, Irvine

  • White Papers // May 2013

    Social Network Based Security Scheme in Mobile Information-Centric Network

    With the spread of mobile Internet, users have increased opportunities to retrieve content from the content producer via the application in mobile information-centric network. For security consideration, the content data must be encrypted and the content producer must be authenticated. Content data is signed by the producer and delivered to...

    Provided By University of California, Irvine

  • White Papers // Sep 2012

    A Unified Characterization of Completeness and Triviality for Secure Function Evaluation

    The authors present unified combinatorial characterizations of completeness for 2-party Secure Function Evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so, they develop new technical concepts. They define several notions of isomorphism of SFE functionalities and...

    Provided By University of California, Irvine

  • White Papers // May 2012

    Hardware Variability-Aware Duty Cycling for Embedded Sensors

    Instance and temperature-dependent power variation has a direct impact on quality of sensing for battery powered, long running sensing applications. The authors measure and characterize active and leakage power for an ARM Cortex M3 processor, and show that across a temperature range of 20 - 60ffiC there is 10% variation...

    Provided By University of California, Irvine

  • White Papers // Apr 2012

    Secure Information Flow for Concurrent Programs under Total Store Order

    Modern multicore hardware and multithreaded programming languages expose weak memory models to programmers, which relax the intuitive Sequential Consistency (SC) memory model in order to support a variety of hardware and compiler optimizations. However, to the authors' knowledge all prior work on secure information flow in a concurrent setting has...

    Provided By University of California, Irvine

  • White Papers // Jan 2011

    Reclaiming Privacy for Smartphone Applications

    The scope of mobile phones has skyrocketed in recent years to such an extent that smartphone sales are expected to surpass those of PCs by the end of 2011. Equipped with relatively powerful processors and fairly large memory and storage capabilities, smartphones can accommodate increasingly complex interactive applications. As a...

    Provided By University of California, Irvine

  • White Papers // Jan 2011

    Comparative Evaluation of Ad-Hoc Routing Protocols in Highly Dynamic Environments

    The authors study the performance of ad hoc unicast routing protocols under extreme mobility (Over 20 m/s). This paper presents extensive evaluation of two reactive (DSR and AODV) and one proactive protocol (FSR). The authors model the topology dynamics and this paper applies the results to improve the investigated protocols....

    Provided By University of California, Irvine

  • White Papers // Oct 2010

    Self-Enhancing Transmission Bias And Active Investing

    Individual investors often invest actively and lose thereby. Social interaction seems to exacerbate this tendency. In the model here, senders' propensities to discuss their strategies' returns, and receivers' propensity to be converted, are increasing in sender return. The rate of conversion of investors to active investing is convex in sender...

    Provided By University of California, Irvine

  • White Papers // Aug 2010

    Practical Private Set Intersection Protocols With Linear Computational and Bandwidth Complexity

    Increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must...

    Provided By University of California, Irvine

  • White Papers // Jun 2010

    Secure Code Update for Embedded Devices Via Proofs of Secure Erasure

    Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is...

    Provided By University of California, Irvine

  • White Papers // May 2010

    Community Driven Data Integration for Emergency Response

    This paper describes the work in progress on an approach and technology for providing integrated data access in situational awareness applications - particularly for disaster and emergency response. The key new aspect of the work is an approach where information aggregation, processing, and integration capabilities are offered as a service...

    Provided By University of California, Irvine

  • White Papers // Apr 2010

    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems

    Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, the authors argue that one of the prominent -and...

    Provided By University of California, Irvine

  • White Papers // Feb 2010

    SOA Middleware Support for Service Process Reconfiguration With End-to-End QoS Constraints

    In SOA, services may become volatile and fail to deliver the quality of service as requested by users. This paper presents an approach for repairing failed services by replacing them with new services and ensuring the new service process still meets the user specified end-to-end QoS constraints. An iterative structural...

    Provided By University of California, Irvine

  • White Papers // Jan 2010

    Providing Database as a Service

    This paper explore a new paradigm for data management in which a third party service provider hosts "Database As A Service" providing its customers seamless mechanisms to create, store, and access their databases at the host site. Such a model alleviates the need for organizations to purchase expensive hardware and...

    Provided By University of California, Irvine

  • White Papers // Jan 2010

    Efficient Node Admission for Short-Lived Mobile Ad Hoc Networks

    Admission control is an essential and fundamental security service in Mobile Ad hoc NETworks (MANETs). It is needed to securely cope with dynamic membership and topology and to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted...

    Provided By University of California, Irvine

  • White Papers // Dec 2009

    Spatial Spectrum Reuse for Heterogeneous Wireless Systems Coexistence

    Cognitive radio is a means to solve the spectrum scarcity problem by allowing secondary spectrum users to share channels with the primary spectrum users in an opportunistic fashion. However, cognitive radio requires high costs in terms of spectrum sensing and monitoring system complexities as well as potential interference issues to...

    Provided By University of California, Irvine

  • White Papers // Nov 2009

    A Zero-One Law for Deterministic 2-Party Secure Computation

    The authors use security in the Universal Composition framework as a means to study the \"Cryptographic complexity\" of 2-party secure computation tasks (functionalities). They say that a functionality F reduces to another functionality G if there is a UC-secure protocol for F using ideal access to G. This reduction is...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    Securing Plastic Money Using an RFID Based Protocol Stack

    Since 2006, there have been three major systems that have been implemented in an attempt to reduce the threat of credit card fraud - Chip and PIN (United Kingdom), Chip Authentication Program - CAP (European Union), and RFID enabled credit cards (United States of America). In spite of a big...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    A Dependency Matrix Based Framework for QoS Diagnosis in SOA

    When a business process fails to deliver the Quality of Service (QoS), it is necessary to identify the faulty services that cause the problem. This paper presents a framework for diagnosing QoS problems in SOA. A set-covering algorithm is used to select the locations of run-time service data collection, or...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    New Channel Access Coordination Functions in Large Scale Wireless LAN Systems

    Large-scale wireless LAN systems based on the IEEE 802.11 standards have become the most successful wireless networks deployed in large organizations, such as educational campuses and corporate warehouses. However, the suite of IEEE 802.11 MAC protocols, including DCF, PCF and EDCA mechanisms, was unable to meet the challenges to provide...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    The Design and Implementation of Service Reservations in Real-Time SOA

    Service-Oriented Architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real-time activities in future SOA applications such as media streaming, control applications, cyber-physical, and intelligent vehicle systems. This paper presents the RT-Llama SOA middleware to support predictability in real-time...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    A Framework for Real-Time Service-Oriented Architecture

    Service-Oriented Architectures (SOA), though widely accepted in a variety of industries, must be enhanced to support real-time activities in order to gain even greater adoption. This paper presents RT-Llama, a novel architecture for real-time SOA to support predictability in business processes. Based on a user-specified process and deadline, the architecture,...

    Provided By University of California, Irvine

  • White Papers // Aug 2009

    On the Usability of Secure Association of Wireless Devices Based on Distance Bounding

    When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared...

    Provided By University of California, Irvine

  • White Papers // Aug 2009

    SocialFilter: Collaborative Spam Mitigation Using Social Networks

    Spam mitigation can be broadly classified into two main approaches: centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage...

    Provided By University of California, Irvine

  • White Papers // Jul 2009

    QoS Routing in Wired Sensor Networks With Partial Updates

    QoS routing is an important component of Traffic Engineering in networks that provide QoS guarantees. QoS routing is dependent on the link state information which is typically flooded across the network. This affects both the quality of the routing and the utilization of the network resources. In this paper, the...

    Provided By University of California, Irvine

  • White Papers // Jul 2009

    Improving Packet Latency of Video Sensor Networks

    Video sensor networks operate on stringent requirements of latency. Packets have a deadline within which they have to be delivered. Violation of the deadline causes a packet to be treated as lost and the loss of packets ultimately affects the quality of the application. Network latency is typically a function...

    Provided By University of California, Irvine

  • White Papers // May 2009

    An Efficient Approach for Service Process Reconfiguration in SOA With End-to-End QoS Constraints

    Using SOA, service processes can be composed statically or dynamically using services provided by different service providers. Some services may become faulty at runtime and cause the service process to violate the end-to-end Quality of Service (QoS) constraint. This paper proposes an efficient approach for replacing faulty services to ensure...

    Provided By University of California, Irvine

  • White Papers // Apr 2009

    Resettably Secure Computation

    The notion of resettable Zero-Knowledge (rZK) was introduced by the researchers as a strengthening of the classical notion of zero-knowledge. A rZK protocol remains zero-knowledge even if the verifier can reset the prover back to its initial state anytime during the protocol execution and force it to use the same...

    Provided By University of California, Irvine

  • White Papers // Feb 2009

    Reducing RFID Reader Load With the Meet-in-the-Middle Strategy

    A general Radio Frequency IDentification (RFID) system consists of a back-end database (Or simply database), multiple readers, and a multitude of tags. The database maintains all system data. A reader relays data between the database and tags by wireless communication with multiple tags in the same period. A tag is...

    Provided By University of California, Irvine

  • White Papers // Feb 2009

    The Software EBox: Integrated Information for Situational Awareness

    This paper describes the development of the "EBox", a system that provides integrated access to a wide variety of information sources relevant to providing situational awareness during emergency response situations. The EBox exemplifies a novel information integration approach in which both preexisting data and real-time information streams are obtained from...

    Provided By University of California, Irvine

  • White Papers // Jan 2009

    Zero-Knowledge from Secure Multiparty Computation

    A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multiparty computation allows n mutually suspicious players to jointly compute a function of their local inputs without revealing to any t corrupted players...

    Provided By University of California, Irvine

  • White Papers // Jan 2009

    A Middleware Approach for Managing Privacy of Outsourced Personal Data

    Advances in networking and web service technologies coupled with the ever increasing need for fast, reliable, and cost-effective storage have made data outsourcing an important trend in the software industry. The outsourcing model offers numerous advantages including improved availability: the data can be accessed 24/7 from any computer connected to...

    Provided By University of California, Irvine

  • White Papers // Oct 2008

    Maximizing Data Survival in Unattended Wireless Sensor Networks Against a Focused Mobile Adversary

    Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off -load sensed data to a safe...

    Provided By University of California, Irvine

  • White Papers // Sep 2008

    Almost-Everywhere Secure Computation

    In this paper, the authors show how to circumvent this impossibility result and achieve meaningful security guarantees for graphs with small degree (such as expander graphs and several other topologies). In fact, the notion they introduce, which they call almost-everywhere MPC, building on the notion of almost everywhere agreement due...

    Provided By University of California, Irvine

  • White Papers // Sep 2008

    Secure Two-Party k-Means Clustering

    The k-Means Clustering problem is one of the most-explored problems in data mining to date. With the advent of protocols that have proven to be successful in performing single database clustering, the focus has changed in recent years to the question of how to extend the single database protocols to...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    New Channel Access Coordination Functions in Large Scale Wireless LAN Systems

    Large-scale wireless LAN systems based on the IEEE 802.11 standards have become the most successful wireless networks deployed in large organizations, such as educational campuses and corporate warehouses. However, the suite of IEEE 802.11 MAC protocols, including DCF, PCF and EDCA mechanisms, was unable to meet the challenges to provide...

    Provided By University of California, Irvine

  • White Papers // Feb 2010

    SOA Middleware Support for Service Process Reconfiguration With End-to-End QoS Constraints

    In SOA, services may become volatile and fail to deliver the quality of service as requested by users. This paper presents an approach for repairing failed services by replacing them with new services and ensuring the new service process still meets the user specified end-to-end QoS constraints. An iterative structural...

    Provided By University of California, Irvine

  • White Papers // Jan 2010

    Providing Database as a Service

    This paper explore a new paradigm for data management in which a third party service provider hosts "Database As A Service" providing its customers seamless mechanisms to create, store, and access their databases at the host site. Such a model alleviates the need for organizations to purchase expensive hardware and...

    Provided By University of California, Irvine

  • White Papers // Jan 2009

    A Middleware Approach for Managing Privacy of Outsourced Personal Data

    Advances in networking and web service technologies coupled with the ever increasing need for fast, reliable, and cost-effective storage have made data outsourcing an important trend in the software industry. The outsourcing model offers numerous advantages including improved availability: the data can be accessed 24/7 from any computer connected to...

    Provided By University of California, Irvine

  • White Papers // Jan 2010

    Efficient Node Admission for Short-Lived Mobile Ad Hoc Networks

    Admission control is an essential and fundamental security service in Mobile Ad hoc NETworks (MANETs). It is needed to securely cope with dynamic membership and topology and to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted...

    Provided By University of California, Irvine

  • White Papers // Dec 2009

    Spatial Spectrum Reuse for Heterogeneous Wireless Systems Coexistence

    Cognitive radio is a means to solve the spectrum scarcity problem by allowing secondary spectrum users to share channels with the primary spectrum users in an opportunistic fashion. However, cognitive radio requires high costs in terms of spectrum sensing and monitoring system complexities as well as potential interference issues to...

    Provided By University of California, Irvine

  • White Papers // Aug 2009

    On the Usability of Secure Association of Wireless Devices Based on Distance Bounding

    When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    The Design and Implementation of Service Reservations in Real-Time SOA

    Service-Oriented Architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real-time activities in future SOA applications such as media streaming, control applications, cyber-physical, and intelligent vehicle systems. This paper presents the RT-Llama SOA middleware to support predictability in real-time...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    A Framework for Real-Time Service-Oriented Architecture

    Service-Oriented Architectures (SOA), though widely accepted in a variety of industries, must be enhanced to support real-time activities in order to gain even greater adoption. This paper presents RT-Llama, a novel architecture for real-time SOA to support predictability in business processes. Based on a user-specified process and deadline, the architecture,...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    A Dependency Matrix Based Framework for QoS Diagnosis in SOA

    When a business process fails to deliver the Quality of Service (QoS), it is necessary to identify the faulty services that cause the problem. This paper presents a framework for diagnosing QoS problems in SOA. A set-covering algorithm is used to select the locations of run-time service data collection, or...

    Provided By University of California, Irvine

  • White Papers // May 2009

    An Efficient Approach for Service Process Reconfiguration in SOA With End-to-End QoS Constraints

    Using SOA, service processes can be composed statically or dynamically using services provided by different service providers. Some services may become faulty at runtime and cause the service process to violate the end-to-end Quality of Service (QoS) constraint. This paper proposes an efficient approach for replacing faulty services to ensure...

    Provided By University of California, Irvine

  • White Papers // Jul 2009

    Improving Packet Latency of Video Sensor Networks

    Video sensor networks operate on stringent requirements of latency. Packets have a deadline within which they have to be delivered. Violation of the deadline causes a packet to be treated as lost and the loss of packets ultimately affects the quality of the application. Network latency is typically a function...

    Provided By University of California, Irvine

  • White Papers // Jul 2009

    QoS Routing in Wired Sensor Networks With Partial Updates

    QoS routing is an important component of Traffic Engineering in networks that provide QoS guarantees. QoS routing is dependent on the link state information which is typically flooded across the network. This affects both the quality of the routing and the utilization of the network resources. In this paper, the...

    Provided By University of California, Irvine

  • White Papers // May 2010

    Community Driven Data Integration for Emergency Response

    This paper describes the work in progress on an approach and technology for providing integrated data access in situational awareness applications - particularly for disaster and emergency response. The key new aspect of the work is an approach where information aggregation, processing, and integration capabilities are offered as a service...

    Provided By University of California, Irvine

  • White Papers // Feb 2009

    The Software EBox: Integrated Information for Situational Awareness

    This paper describes the development of the "EBox", a system that provides integrated access to a wide variety of information sources relevant to providing situational awareness during emergency response situations. The EBox exemplifies a novel information integration approach in which both preexisting data and real-time information streams are obtained from...

    Provided By University of California, Irvine

  • White Papers // Oct 2008

    Maximizing Data Survival in Unattended Wireless Sensor Networks Against a Focused Mobile Adversary

    Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off -load sensed data to a safe...

    Provided By University of California, Irvine

  • White Papers // Aug 2010

    Practical Private Set Intersection Protocols With Linear Computational and Bandwidth Complexity

    Increasing dependence on anytime-anywhere availability of data and the commensurately increasing fear of losing privacy motivate the need for privacy-preserving techniques. One interesting and common problem occurs when two parties need to privately compute an intersection of their respective sets of data. In doing so, one or both parties must...

    Provided By University of California, Irvine

  • White Papers // Apr 2010

    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems

    Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, the authors argue that one of the prominent -and...

    Provided By University of California, Irvine

  • White Papers // Oct 2009

    Securing Plastic Money Using an RFID Based Protocol Stack

    Since 2006, there have been three major systems that have been implemented in an attempt to reduce the threat of credit card fraud - Chip and PIN (United Kingdom), Chip Authentication Program - CAP (European Union), and RFID enabled credit cards (United States of America). In spite of a big...

    Provided By University of California, Irvine

  • White Papers // Feb 2009

    Reducing RFID Reader Load With the Meet-in-the-Middle Strategy

    A general Radio Frequency IDentification (RFID) system consists of a back-end database (Or simply database), multiple readers, and a multitude of tags. The database maintains all system data. A reader relays data between the database and tags by wireless communication with multiple tags in the same period. A tag is...

    Provided By University of California, Irvine

  • White Papers // Jun 2010

    Secure Code Update for Embedded Devices Via Proofs of Secure Erasure

    Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previously proposed remote attestation techniques assisted by specialized secure hardware are effective, they not yet viable for low-cost embedded devices. One notable alternative is...

    Provided By University of California, Irvine

  • White Papers // Jan 2011

    Reclaiming Privacy for Smartphone Applications

    The scope of mobile phones has skyrocketed in recent years to such an extent that smartphone sales are expected to surpass those of PCs by the end of 2011. Equipped with relatively powerful processors and fairly large memory and storage capabilities, smartphones can accommodate increasingly complex interactive applications. As a...

    Provided By University of California, Irvine

  • White Papers // Jan 2011

    Comparative Evaluation of Ad-Hoc Routing Protocols in Highly Dynamic Environments

    The authors study the performance of ad hoc unicast routing protocols under extreme mobility (Over 20 m/s). This paper presents extensive evaluation of two reactive (DSR and AODV) and one proactive protocol (FSR). The authors model the topology dynamics and this paper applies the results to improve the investigated protocols....

    Provided By University of California, Irvine

  • White Papers // Aug 2009

    SocialFilter: Collaborative Spam Mitigation Using Social Networks

    Spam mitigation can be broadly classified into two main approaches: centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage...

    Provided By University of California, Irvine

  • White Papers // Oct 2010

    Self-Enhancing Transmission Bias And Active Investing

    Individual investors often invest actively and lose thereby. Social interaction seems to exacerbate this tendency. In the model here, senders' propensities to discuss their strategies' returns, and receivers' propensity to be converted, are increasing in sender return. The rate of conversion of investors to active investing is convex in sender...

    Provided By University of California, Irvine

  • White Papers // May 2013

    Social Network Based Security Scheme in Mobile Information-Centric Network

    With the spread of mobile Internet, users have increased opportunities to retrieve content from the content producer via the application in mobile information-centric network. For security consideration, the content data must be encrypted and the content producer must be authenticated. Content data is signed by the producer and delivered to...

    Provided By University of California, Irvine

  • White Papers // Nov 2009

    A Zero-One Law for Deterministic 2-Party Secure Computation

    The authors use security in the Universal Composition framework as a means to study the \"Cryptographic complexity\" of 2-party secure computation tasks (functionalities). They say that a functionality F reduces to another functionality G if there is a UC-secure protocol for F using ideal access to G. This reduction is...

    Provided By University of California, Irvine

  • White Papers // Apr 2012

    Secure Information Flow for Concurrent Programs under Total Store Order

    Modern multicore hardware and multithreaded programming languages expose weak memory models to programmers, which relax the intuitive Sequential Consistency (SC) memory model in order to support a variety of hardware and compiler optimizations. However, to the authors' knowledge all prior work on secure information flow in a concurrent setting has...

    Provided By University of California, Irvine

  • White Papers // Sep 2012

    A Unified Characterization of Completeness and Triviality for Secure Function Evaluation

    The authors present unified combinatorial characterizations of completeness for 2-party Secure Function Evaluation (SFE) against passive and active corruptions in the information-theoretic setting, so that all known characterizations appear as special cases. In doing so, they develop new technical concepts. They define several notions of isomorphism of SFE functionalities and...

    Provided By University of California, Irvine

  • White Papers // Sep 2008

    Secure Two-Party k-Means Clustering

    The k-Means Clustering problem is one of the most-explored problems in data mining to date. With the advent of protocols that have proven to be successful in performing single database clustering, the focus has changed in recent years to the question of how to extend the single database protocols to...

    Provided By University of California, Irvine

  • White Papers // Jan 2009

    Zero-Knowledge from Secure Multiparty Computation

    A zero-knowledge proof allows a prover to convince a verifier of an assertion without revealing any further information beyond the fact that the assertion is true. Secure multiparty computation allows n mutually suspicious players to jointly compute a function of their local inputs without revealing to any t corrupted players...

    Provided By University of California, Irvine

  • White Papers // Apr 2009

    Resettably Secure Computation

    The notion of resettable Zero-Knowledge (rZK) was introduced by the researchers as a strengthening of the classical notion of zero-knowledge. A rZK protocol remains zero-knowledge even if the verifier can reset the prover back to its initial state anytime during the protocol execution and force it to use the same...

    Provided By University of California, Irvine

  • White Papers // Jul 2013

    MrCrypt: Static Analysis for Secure Cloud Computations

    In a common use case for cloud computing, clients upload data and computation to servers that are managed by a third-party infrastructure provider. The authors describe MrCrypt, a system that provides data confidentiality in this setting by executing client computations on encrypted data. MrCrypt statically analyzes a program to identify...

    Provided By University of California, Irvine

  • White Papers // Sep 2013

    On the Power of Public-Key Encryption in Secure Computation

    Public-Key Encryption (PKE) is an important security primitive in a system involving more than two parties. In this paper, the authors ask if PKE could be useful for protecting two mutually distrusting parties against each other, if there is no other party involved. They qualitatively separate semi-honest secure computation of...

    Provided By University of California, Irvine

  • White Papers // Sep 2008

    Almost-Everywhere Secure Computation

    In this paper, the authors show how to circumvent this impossibility result and achieve meaningful security guarantees for graphs with small degree (such as expander graphs and several other topologies). In fact, the notion they introduce, which they call almost-everywhere MPC, building on the notion of almost everywhere agreement due...

    Provided By University of California, Irvine

  • White Papers // Jan 2014

    Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks

    Providing security support for mobile ad-hoc networks is challenging for several reasons: wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional break-ins by adversaries may be inevitable in a large time window; mobile users demand \"Anywhere, anytime\" services; a scalable solution is needed for a...

    Provided By University of California, Irvine

  • White Papers // May 2012

    Hardware Variability-Aware Duty Cycling for Embedded Sensors

    Instance and temperature-dependent power variation has a direct impact on quality of sensing for battery powered, long running sensing applications. The authors measure and characterize active and leakage power for an ARM Cortex M3 processor, and show that across a temperature range of 20 - 60ffiC there is 10% variation...

    Provided By University of California, Irvine

  • White Papers // Feb 2014

    Minimizing Clock Domain Crossing in Network on Chip Interconnect

    Network-on-Chip (NoC) architectures have been widely adopted as the preferred solution to the communication challenges of System-on-Chip (SoC) design in the nanoscale regime. SoC designs often incorporate custom NoC architectures that do not conform to regular topologies. This requires the generation of a power and resource efficient interconnection architecture that...

    Provided By University of California, Irvine