University of Illinois at Chicago

Displaying 1-33 of 33 results

  • White Papers // Jan 2013

    Systems Support for Radiational Plume Detection, Identication, and Tracking Sensor-Cyber Networks

    Oak Ridge National Lab (ORNL), University of Illinois at Urbana Champaign (UIUC), and Purdue University are collaborative partners in a sensor-cyber network project supported under the national SensorNet Initiative. The project aims to design, realize, evaluate, and deploy a Detection, Identication, and Tracking Sensor Cyber Network (DITSCN) for chemical and...

    Provided By University of Illinois at Chicago

  • White Papers // Dec 2012

    Securing Anonymous Communication Channels Under the Selective DoS Attack

    Anonymous communication systems are subject to selective Denial-of-Service (DoS) attacks. Selective DoS attacks lower anonymity as they force paths to be rebuilt multiple times to ensure delivery which increases the opportunity for more attack. In this paper, the authors present a detection algorithm that filters out compromised communication channels for...

    Provided By University of Illinois at Chicago

  • White Papers // Dec 2012

    LowRank Mechanism: Optimizing Batch Queries Under Differential Privacy

    Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence of any individual record from the published noisy results. The main...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2012

    The New SHA-3 Software Shootout

    This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. The authors have integrated this graphing mechanism into their eBASH (ECRYPT Benchmarking of All Submitted Hashes) project....

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2011

    Delay and Energy Analysis in Sparse Mobile Networks

    In this paper, the authors describe the in-network processing of queries and answers, communication and mobility. They develop the analytical models to compute the system delay and the system energy consumption for P2P query processing schemes in sparse mobile networks. The analysis is based on Ordinary Differential Equations (ODE's) that...

    Provided By University of Illinois at Chicago

  • White Papers // Sep 2011

    Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results

    The capacity of the Gaussian cognitive interference channel, a variation of the classical two-user interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. This paper provides a comparative overview of this channel...

    Provided By University of Illinois at Chicago

  • White Papers // May 2011

    Securing Tor Tunnels Under the Selective-DoS Attack

    Low-latency anonymity networks like Tor are subject to selective Denial-of-Service (DoS) attack. Selective-DoS attack lowers anonymity as it forces paths to be rebuilt multiple times to ensure delivery which increases the opportunity for more attack. In this paper, the authors present a detection algorithm which filters out compromised tunnels from...

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2011

    On Cognitive Channels With an Oblivion Constraint

    The authors consider a Gaussian point-to-point secondary link which co-exists with a Gaussian point-to-point primary link, and is permitted to transmit within the primary user's interference margin - a simple but realistic channel model for underlay cognitive systems. Under this assumption, they are interested in quantifying the secondary user rate...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2011

    Managing Business Health in the Presence of Malicious Attacks

    Business metrics play a critical role in determining the best system-level configuration to achieve an organizational business-level goal. The authors present a framework for reasoning about business-level implications of malicious attacks affecting Information Technology (IT) systems that underlie various business processes. Through an exemplar web-based retail company scenario, they demonstrate...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    A Lattice Compress-and-Forward Strategy for Canceling Known Interference in Gaussian Multi-Hop Channels

    The authors present a nested-lattice encoding and decoding strategy for Compress-and-Forward (CF) relaying. This complements previous work on a nested-lattice encoding and decoding scheme for Decode-and-Forward (DF) relaying, and provides an alternative to random codes for CF relaying which may be a useful coding strategy for larger networks. The proposed...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    The Capacity of the Semi-Deterministic Cognitive Interference Channel and Its Application to Constant Gap Results for the Gaussian Channel

    The Cognitive InterFerence Channel (C-IFC) consists of a classical two-user interference channel in which the message of one user (the "Primary" user) is non-causally available at the transmitter of the other user (the "Cognitive" user). They obtain the capacity of the semi-deterministic C-IFC: a discrete memoryless C-IFC in which the...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    (Approximately) Privacy-Preserving Dissection Protocols

    The authors further investigate the approximate privacy model recently introduced by Feigenbaum et al. They explore the privacy properties of a natural class of communication protocols that they refer to as "Dissection protocols". Under a dissection protocol, the communicating parties are restricted to answering questions of the form "Is one's...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2011

    Structured Interference-Mitigation in Two-Hop Networks

    The authors consider two-hop S-R-D Gaussian networks with a Source (S), a Relay (R) and a Destination (D), some of which experience additive interference. This additive interference, which renders the channels state-dependent, is either experienced at the destination D and known non-causally at the source S, or experienced at the...

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2010

    New Inner and Outer Bounds for the Discrete Memoryless Cognitive Interference Channel and Some Capacity Results

    The cognitive interference channel is an interference channel in which one transmitter is non-causally provided with the message of the other transmitter. This channel model has been extensively studied in the past years and capacity results for certain classes of channels have been proved. In this paper, the authors present...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    Scalable Anonymous Communication with Provable Security

    A key problem in Tor's architecture is that it requires users to maintain a global view of the system, which will become costly as the size of the network increases. Several peer-to-peer approaches have been proposed in order to alleviate the scalability concerns of the Tor network, but they are...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    New Results on the Capacity of the Gaussian Cognitive Interference Channel

    The capacity of the two-user Gaussian cognitive interference channel, a variation of the classical interference channel where one of the transmitters has knowledge of both messages, is known in several parameter regimes but remains unknown in general. In this paper, the authors consider the following achievable scheme: the cognitive transmitter...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    Outer Bounds for the Interference Channel With a Cognitive Relay

    In this paper, the authors first present an outer bound for a general interference channel with a cognitive relay, i.e., a relay that has non-causal knowledge of both independent messages transmitted in the interference channel. This outer bound reduces to the capacity region of the deterministic broadcast channel and of...

    Provided By University of Illinois at Chicago

  • White Papers // Jun 2010

    A Unified Scheduling Framework Based on Virtual Timers For Selfish-Policy Shared Spectrum

    The issue of efficiency and fairness in resource allocation will continue to be of significant importance in scheduler designs for future wireless systems. Of particular importance is the development of distributed techniques for achieving desired efficiency and fairness tradeoffs. The authors will focus on the design of selfishly efficient and...

    Provided By University of Illinois at Chicago

  • White Papers // Jun 2010

    AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

    Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitive page content to confidentiality and integrity attacks launched by advertisements. In this paper, the authors propose a novel framework for addressing security threats posed by third-party advertisements....

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2010

    An Overview of the Open Science Data Cloud

    The Open Science Data Cloud is a distributed cloud based infrastructure for managing, analyzing, archiving and sharing scientific datasets. This paper introduces the Open Science Data Cloud, give an overview of its architecture, provide an up-date on its current status, and brie y describe some research areas of relevance. Many...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2010

    State of the Cognitive Interference Channel: A New Unified Inner Bound

    The capacity region of the interference channel in which one transmitter non-causally knows the message of the other, termed the cognitive interference channel, has remained open since its inception in 2005. A number of subtly differing achievable rate regions and outer bounds have been derived, some of which are tight...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2010

    Privacy Issues of Vehicular Ad-Hoc Networks

    Vehicular Ad-Hoc Networks are networks of communication between vehicles and roadside units. These networks have the potential to increase safety and provide many services to drivers, but they also present risks to privacy. Researching mechanism to protect privacy requires two key ingredients: a precise definition of privacy that reflects citizens'...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    SWIFT: Scheduling in Web Servers for Fast Response Time

    This paper addresses the problem of how to service web requests quickly in order to minimize the client response time. Some of the recent work uses the idea of the Shortest Remaining Processing Time scheduling (SRPT) in Web servers in order to give preference to requests for short files. However,...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    Java Security Model and Bytecode Verification

    Security is the practice by which individuals and organizations protect their physical and intellectual property from all forms of attack and pillage. Although security concerns are not new, there is revived interest in the entire area of security in computing systems. This is because today's information systems have become the...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    UML Diagrams to Object Petri Net Models: An Approach for Modeling and Analysis

    UML, being the industry standard as a common OO modeling language needs a well-defined semantic base for its notation. Formalization of the graphical notation enables automated processing and analysis tasks. Object Petri Nets (OPN) can provide a formal semantic framework for the UML notations plus the behavioral modeling/ analysis strength...

    Provided By University of Illinois at Chicago

  • White Papers // Nov 2009

    Remote Visualization of Large Scale Data for Ultra-High Resolution Display Environments

    ParaView is one of the most widely used scientific tools that support parallel visualization of large scale data. The Scalable Adaptive Graphics Environment (SAGE) is a graphics middleware that enables real-time streaming of ultra-high resolution visual content from distributed visualization resources to scalable tiled displays connected by ultra-high-speed networks. Integrating...

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2009

    The Capacity Region of Gaussian Cognitive Radio Channels to Within 1.87 Bits

    The authors make use of the deterministic high-SNR approximation of the Gaussian cognitive radio channel to gain insights in deriving inner and outer bounds for any SNR. They show that the derived bounds are at most 1.87 bits apart for any SNR. Advancements in wireless technology have enabled the cooperation...

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2009

    The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

    Deterministic channel models have recently proven to be powerful tools for obtaining capacity bounds for Gaussian multiuser networks that are tight in the high SNR regime. In this paper, the authors apply this technique to the Gaussian cognitive radio channel: a 2 ? 2 interference channel in which one transmitter...

    Provided By University of Illinois at Chicago

  • White Papers // Aug 2008

    A Modified Fuzzy C-Means Algorithm for Collaborative Filtering

    Traditionally, recommender systems operate based on user-behavior and rating data at the personal and/or aggregate level. In this talk, the author will try to go beyond this tradition to discuss some new/future developments of recommender systems, even general advertising systems for that matter, based on opinions on the Web (e.g.,...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2008

    Towards Standards-Compliant Trust Negotiation for Web Services

    Web services are a powerful distributed computing abstraction in that they enable users to develop workflows that incorporate data and information processing services located in multiple organizational domains. Fully realizing the potential of this computing paradigm requires a flexible authorization mechanism that can function correctly without a priori knowledge of...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2006

    Toward an On-Demand Restricted Delegation Mechanism for Grids

    Grids are intended to enable a cross-organizational interaction which makes grid security a challenging and non-trivial issue. In grids, delegation is a key facility that can be used to authenticate and authorize requests on behalf of disconnected users. In current grid systems there is a tradeoff between flexibility and security...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2006

    Open Problems for Usable and Secure Open Systems

    In open computing systems, resources are shared across organizational boundaries in an effort to allow for greater access to information and easier collaboration between geographically and administratively dispersed groups. Designing adequate access control solutions for these types of systems is a challenging task, as traditional solutions tend to exhibit failures...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2006

    Virtual Fingerprinting as a Foundation for Reputation in Open Systems

    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/ prevention mechanisms, and reputation systems taken for granted in traditional distributed systems. In this paper, the authors show that as two entities in an...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2013

    Systems Support for Radiational Plume Detection, Identication, and Tracking Sensor-Cyber Networks

    Oak Ridge National Lab (ORNL), University of Illinois at Urbana Champaign (UIUC), and Purdue University are collaborative partners in a sensor-cyber network project supported under the national SensorNet Initiative. The project aims to design, realize, evaluate, and deploy a Detection, Identication, and Tracking Sensor Cyber Network (DITSCN) for chemical and...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2008

    Towards Standards-Compliant Trust Negotiation for Web Services

    Web services are a powerful distributed computing abstraction in that they enable users to develop workflows that incorporate data and information processing services located in multiple organizational domains. Fully realizing the potential of this computing paradigm requires a flexible authorization mechanism that can function correctly without a priori knowledge of...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2006

    Toward an On-Demand Restricted Delegation Mechanism for Grids

    Grids are intended to enable a cross-organizational interaction which makes grid security a challenging and non-trivial issue. In grids, delegation is a key facility that can be used to authenticate and authorize requests on behalf of disconnected users. In current grid systems there is a tradeoff between flexibility and security...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2006

    Virtual Fingerprinting as a Foundation for Reputation in Open Systems

    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/ prevention mechanisms, and reputation systems taken for granted in traditional distributed systems. In this paper, the authors show that as two entities in an...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2006

    Open Problems for Usable and Secure Open Systems

    In open computing systems, resources are shared across organizational boundaries in an effort to allow for greater access to information and easier collaboration between geographically and administratively dispersed groups. Designing adequate access control solutions for these types of systems is a challenging task, as traditional solutions tend to exhibit failures...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2011

    Managing Business Health in the Presence of Malicious Attacks

    Business metrics play a critical role in determining the best system-level configuration to achieve an organizational business-level goal. The authors present a framework for reasoning about business-level implications of malicious attacks affecting Information Technology (IT) systems that underlie various business processes. Through an exemplar web-based retail company scenario, they demonstrate...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    Scalable Anonymous Communication with Provable Security

    A key problem in Tor's architecture is that it requires users to maintain a global view of the system, which will become costly as the size of the network increases. Several peer-to-peer approaches have been proposed in order to alleviate the scalability concerns of the Tor network, but they are...

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2010

    An Overview of the Open Science Data Cloud

    The Open Science Data Cloud is a distributed cloud based infrastructure for managing, analyzing, archiving and sharing scientific datasets. This paper introduces the Open Science Data Cloud, give an overview of its architecture, provide an up-date on its current status, and brie y describe some research areas of relevance. Many...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    SWIFT: Scheduling in Web Servers for Fast Response Time

    This paper addresses the problem of how to service web requests quickly in order to minimize the client response time. Some of the recent work uses the idea of the Shortest Remaining Processing Time scheduling (SRPT) in Web servers in order to give preference to requests for short files. However,...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    Java Security Model and Bytecode Verification

    Security is the practice by which individuals and organizations protect their physical and intellectual property from all forms of attack and pillage. Although security concerns are not new, there is revived interest in the entire area of security in computing systems. This is because today's information systems have become the...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2010

    UML Diagrams to Object Petri Net Models: An Approach for Modeling and Analysis

    UML, being the industry standard as a common OO modeling language needs a well-defined semantic base for its notation. Formalization of the graphical notation enables automated processing and analysis tasks. Object Petri Nets (OPN) can provide a formal semantic framework for the UML notations plus the behavioral modeling/ analysis strength...

    Provided By University of Illinois at Chicago

  • White Papers // Aug 2008

    A Modified Fuzzy C-Means Algorithm for Collaborative Filtering

    Traditionally, recommender systems operate based on user-behavior and rating data at the personal and/or aggregate level. In this talk, the author will try to go beyond this tradition to discuss some new/future developments of recommender systems, even general advertising systems for that matter, based on opinions on the Web (e.g.,...

    Provided By University of Illinois at Chicago

  • White Papers // Jun 2010

    AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

    Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitive page content to confidentiality and integrity attacks launched by advertisements. In this paper, the authors propose a novel framework for addressing security threats posed by third-party advertisements....

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    (Approximately) Privacy-Preserving Dissection Protocols

    The authors further investigate the approximate privacy model recently introduced by Feigenbaum et al. They explore the privacy properties of a natural class of communication protocols that they refer to as "Dissection protocols". Under a dissection protocol, the communicating parties are restricted to answering questions of the form "Is one's...

    Provided By University of Illinois at Chicago

  • White Papers // Nov 2009

    Remote Visualization of Large Scale Data for Ultra-High Resolution Display Environments

    ParaView is one of the most widely used scientific tools that support parallel visualization of large scale data. The Scalable Adaptive Graphics Environment (SAGE) is a graphics middleware that enables real-time streaming of ultra-high resolution visual content from distributed visualization resources to scalable tiled displays connected by ultra-high-speed networks. Integrating...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2010

    Privacy Issues of Vehicular Ad-Hoc Networks

    Vehicular Ad-Hoc Networks are networks of communication between vehicles and roadside units. These networks have the potential to increase safety and provide many services to drivers, but they also present risks to privacy. Researching mechanism to protect privacy requires two key ingredients: a precise definition of privacy that reflects citizens'...

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2011

    Delay and Energy Analysis in Sparse Mobile Networks

    In this paper, the authors describe the in-network processing of queries and answers, communication and mobility. They develop the analytical models to compute the system delay and the system energy consumption for P2P query processing schemes in sparse mobile networks. The analysis is based on Ordinary Differential Equations (ODE's) that...

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2009

    The Capacity Region of Gaussian Cognitive Radio Channels to Within 1.87 Bits

    The authors make use of the deterministic high-SNR approximation of the Gaussian cognitive radio channel to gain insights in deriving inner and outer bounds for any SNR. They show that the derived bounds are at most 1.87 bits apart for any SNR. Advancements in wireless technology have enabled the cooperation...

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2009

    The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

    Deterministic channel models have recently proven to be powerful tools for obtaining capacity bounds for Gaussian multiuser networks that are tight in the high SNR regime. In this paper, the authors apply this technique to the Gaussian cognitive radio channel: a 2 ? 2 interference channel in which one transmitter...

    Provided By University of Illinois at Chicago

  • White Papers // Jun 2010

    A Unified Scheduling Framework Based on Virtual Timers For Selfish-Policy Shared Spectrum

    The issue of efficiency and fairness in resource allocation will continue to be of significant importance in scheduler designs for future wireless systems. Of particular importance is the development of distributed techniques for achieving desired efficiency and fairness tradeoffs. The authors will focus on the design of selfishly efficient and...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    New Results on the Capacity of the Gaussian Cognitive Interference Channel

    The capacity of the two-user Gaussian cognitive interference channel, a variation of the classical interference channel where one of the transmitters has knowledge of both messages, is known in several parameter regimes but remains unknown in general. In this paper, the authors consider the following achievable scheme: the cognitive transmitter...

    Provided By University of Illinois at Chicago

  • White Papers // Jan 2011

    Structured Interference-Mitigation in Two-Hop Networks

    The authors consider two-hop S-R-D Gaussian networks with a Source (S), a Relay (R) and a Destination (D), some of which experience additive interference. This additive interference, which renders the channels state-dependent, is either experienced at the destination D and known non-causally at the source S, or experienced at the...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    A Lattice Compress-and-Forward Strategy for Canceling Known Interference in Gaussian Multi-Hop Channels

    The authors present a nested-lattice encoding and decoding strategy for Compress-and-Forward (CF) relaying. This complements previous work on a nested-lattice encoding and decoding scheme for Decode-and-Forward (DF) relaying, and provides an alternative to random codes for CF relaying which may be a useful coding strategy for larger networks. The proposed...

    Provided By University of Illinois at Chicago

  • White Papers // Apr 2011

    On Cognitive Channels With an Oblivion Constraint

    The authors consider a Gaussian point-to-point secondary link which co-exists with a Gaussian point-to-point primary link, and is permitted to transmit within the primary user's interference margin - a simple but realistic channel model for underlay cognitive systems. Under this assumption, they are interested in quantifying the secondary user rate...

    Provided By University of Illinois at Chicago

  • White Papers // Sep 2011

    Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results

    The capacity of the Gaussian cognitive interference channel, a variation of the classical two-user interference channel where one of the transmitters (referred to as cognitive) has knowledge of both messages, is known in several parameter regimes but remains unknown in general. This paper provides a comparative overview of this channel...

    Provided By University of Illinois at Chicago

  • White Papers // Oct 2010

    New Inner and Outer Bounds for the Discrete Memoryless Cognitive Interference Channel and Some Capacity Results

    The cognitive interference channel is an interference channel in which one transmitter is non-causally provided with the message of the other transmitter. This channel model has been extensively studied in the past years and capacity results for certain classes of channels have been proved. In this paper, the authors present...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2011

    The Capacity of the Semi-Deterministic Cognitive Interference Channel and Its Application to Constant Gap Results for the Gaussian Channel

    The Cognitive InterFerence Channel (C-IFC) consists of a classical two-user interference channel in which the message of one user (the "Primary" user) is non-causally available at the transmitter of the other user (the "Cognitive" user). They obtain the capacity of the semi-deterministic C-IFC: a discrete memoryless C-IFC in which the...

    Provided By University of Illinois at Chicago

  • White Papers // Mar 2010

    State of the Cognitive Interference Channel: A New Unified Inner Bound

    The capacity region of the interference channel in which one transmitter non-causally knows the message of the other, termed the cognitive interference channel, has remained open since its inception in 2005. A number of subtly differing achievable rate regions and outer bounds have been derived, some of which are tight...

    Provided By University of Illinois at Chicago

  • White Papers // Jul 2010

    Outer Bounds for the Interference Channel With a Cognitive Relay

    In this paper, the authors first present an outer bound for a general interference channel with a cognitive relay, i.e., a relay that has non-causal knowledge of both independent messages transmitted in the interference channel. This outer bound reduces to the capacity region of the deterministic broadcast channel and of...

    Provided By University of Illinois at Chicago

  • White Papers // Feb 2012

    The New SHA-3 Software Shootout

    This paper introduces a new graphing mechanism to allow easy comparison of software performance of the SHA-3 candidates. The new mechanism concisely captures a large amount of performance data without oversimplifying the data. The authors have integrated this graphing mechanism into their eBASH (ECRYPT Benchmarking of All Submitted Hashes) project....

    Provided By University of Illinois at Chicago

  • White Papers // May 2011

    Securing Tor Tunnels Under the Selective-DoS Attack

    Low-latency anonymity networks like Tor are subject to selective Denial-of-Service (DoS) attack. Selective-DoS attack lowers anonymity as it forces paths to be rebuilt multiple times to ensure delivery which increases the opportunity for more attack. In this paper, the authors present a detection algorithm which filters out compromised tunnels from...

    Provided By University of Illinois at Chicago

  • White Papers // Dec 2012

    LowRank Mechanism: Optimizing Batch Queries Under Differential Privacy

    Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence of any individual record from the published noisy results. The main...

    Provided By University of Illinois at Chicago

  • White Papers // Dec 2012

    Securing Anonymous Communication Channels Under the Selective DoS Attack

    Anonymous communication systems are subject to selective Denial-of-Service (DoS) attacks. Selective DoS attacks lower anonymity as they force paths to be rebuilt multiple times to ensure delivery which increases the opportunity for more attack. In this paper, the authors present a detection algorithm that filters out compromised communication channels for...

    Provided By University of Illinois at Chicago