University of Ljubljana

Displaying 1-40 of 57 results

  • White Papers // Jan 2014

    Measuring SSL and SET Against E-Commerce Consumer Requirements

    The threat of credit card fraud is arguably one of the most serious issues in e-commerce, since it makes consumers reluctant to engage in this alternative method of shopping. Most previous authors have focused on technical and business issues, whilst virtually ignoring consumer confidence. If consumers are to lose their...

    Provided By University of Ljubljana

  • White Papers // Nov 2013

    Plaintext Recovery Attacks Against WPA/TKIP

    The cryptographic mechanisms that aim at protecting transmitted data in modern wireless computer networks have seen an on-going evolution. The authors conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with...

    Provided By University of Ljubljana

  • White Papers // Oct 2013

    Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig

    One of the recommended principles of sound cryptographic design is key separation, meaning that keys used for one purpose (e.g. encryption) should not be used for another purpose (e.g. signing). The reason is that, even if the individual uses are secure, the joint usage could be insecure. This paper shows,...

    Provided By University of Ljubljana

  • White Papers // Jul 2013

    On the Security of RC4 in TLS and WPA

    The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto protocol standard for secured internet and mobile applications. TLS supports several symmetric encryption options, including a scheme based on the RC4 stream cipher. In this...

    Provided By University of Ljubljana

  • White Papers // Jun 2013

    On the Security of the TLS Protocol: A Systematic Analysis

    TLS is the most widely-used cryptographic protocol on the internet. It comprises the TLS handshake protocol, responsible for authentication and key establishment, and the TLS record protocol, which takes care of subsequent use of those keys to protect bulk data. TLS has proved remarkably stubborn to analysis using the tools...

    Provided By University of Ljubljana

  • White Papers // Jun 2013

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Most security models for Authenticated Key Exchange (AKE) do not explicitly model the associated certification system, which includes the Certification Authority (CA) and its behavior. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the...

    Provided By University of Ljubljana

  • White Papers // Jun 2013

    Query Rewriting and Optimisation with Database Dependencies in Ontop

    Ontology-Based Data Access (OBDA) is regarded as a key ingredient for the new generation of information systems. In the OBDA paradigm, an ontology defines a high-level global schema and provides a vocabulary for user queries, thus isolating the user from the details of the data source structure. The authors present...

    Provided By University of Ljubljana

  • White Papers // Jun 2013

    Programmable Hash Functions in the Multilinear Setting

    The authors adapt the concept of a programmable hash function to a setting in which a multi-linear map is available. This enables new PHFs with previously unachieved parameters. To demonstrate their usefulness, they show how their (standard-model) PHFs can replace random oracles in several well-known cryptographic constructions. Namely, they obtain...

    Provided By University of Ljubljana

  • White Papers // May 2013

    Consistency and Complexity Tradeoffs for Highly-Available Multi-Cloud Store

    Cloud-based storage services have established themselves as a paradigm of choice for supporting bulk storage needs of modern networked services and applications. Although individual storage service providers can be trusted to do their best to reliably store the user data, exclusive reliance on any single provider or storage service leaves...

    Provided By University of Ljubljana

  • White Papers // Apr 2013

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AEAD) schemes. These schemes are widely used and standardized, the most well known being McGrew and viega's Galois/Counter Mode (GCM). In this paper...

    Provided By University of Ljubljana

  • White Papers // Mar 2013

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Backwards compatibility attacks are based on the common practical scenario that a cryptographic standard offers a choice between several algorithms to perform the same cryptographic task. This often includes secure state-of-the-art cryptosystems, as well as insecure legacy cryptosystems with known vulnerabilities that are made available for backwards compatibility reasons. Obviously...

    Provided By University of Ljubljana

  • White Papers // Feb 2013

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto secure protocol of choice for Internet and mobile applications. DTLS is a variant of TLS that is growing in importance. In this paper, the authors...

    Provided By University of Ljubljana

  • White Papers // Jan 2013

    Negotiating Cloud Contracts: Looking at Clouds from Both Sides Now

    Contract terms for cloud computing services are evolving, driven by users' attempts to negotiate providers' standard terms to make them more suitable for their requirements, as well as market developments, particularly among cloud integrators. This paper, drawing on sources including interviews with cloud computing providers, users and other market actors,...

    Provided By University of Ljubljana

  • White Papers // Jan 2013

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Inspired by cold boot attacks, Heninger and Shacham (Crypto 2009) initiated the study of the problem of how to recover an RSA private key from a noisy version of that key. They gave an algorithm for the case where some bits of the private key are known with certainty. Their...

    Provided By University of Ljubljana

  • White Papers // Dec 2012

    Non-Interactive Key Exchange

    Non-Interactive Key Exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, the authors provide different security models for this primitive and explore the relationships between...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    Robust Encryption, Revisited

    The authors revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of the main motivations for the introduction of strong robustness for Public-Key Encryption (PKE) by Abdalla et al. to prevent certain types of attack on Sako's auction protocol. They show, perhaps surprisingly, that Sako's...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    QoS-Aware Multi-Plane Routing for Future IP-Based Access Networks

    With the increasing interest in continuous media streaming applications such as audio and video, Quality of Service (QoS) is becoming more and more important. Providing QoS guarantees in packet access networks gives rise to several challenging issues. There are several aspects of QoS to be considered. For example, to support...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    There are numerous examples where it is desirable to provide differentiated access to data according to an access control policy. Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic means. In this paper, the authors present a new, enhanced security model for such schemes. They...

    Provided By University of Ljubljana

  • White Papers // Oct 2012

    A Coding Theory Foundation for the Analysis of General Unconditionally Secure Proof-of-Retrievability Schemes for Cloud

    There has been considerable recent interest in "Cloud storage" wherein a user asks a server to store a large le. One issue is whether the user can verify that the server is actually storing the le, and typically a challenge-response protocol is employed to convince the user that the le...

    Provided By University of Ljubljana

  • White Papers // Sep 2012

    Gaming Security by Obscurity

    Shannon sought security against the attacker with unlimited computational powers: if information source conveys some information, then Shannon's attacker will surely extract that information. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Are We Compromised? Modelling Security Assessment Games

    Security assessments are an integral part of organizations' strategies for protecting their digital assets and critical IT infrastructure. In this paper, the authors propose a game-theoretic modeling of a particular form of security assessment - one which addresses the question "Are the people compromised?". They do so by extending the...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Adaptive Threshold for Energy Detector Based on Discrete Wavelet Packet Transform

    One promising approach to achieving high precision and low complexity in a cognitive radio system is the energy detector based on the Discrete Wavelet Packet Transform (DWPT). However, the thresholds used in previous spectrum detection algorithms are fixed values determined by false alarm probability and sample points. When the Signal...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Model Checking of The Reliability of Publish/Subscribe Structure Based System

    The recent studies show that Information Centric is one of the best ways to help Internet users find useful messages among a myriad of information. With the help of a publisher/subscriber structure, users could use this Information Centric System to subscribe to messages they have interest or from the ones...

    Provided By University of Ljubljana

  • White Papers // Feb 2012

    Commentary : Cloud Computing - A Security Problem or Solution?

    The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organizationally. This new paradigm presents a number of security challenges that still need to be resolved but sufficient change in the IT environment has already happened -...

    Provided By University of Ljubljana

  • White Papers // Jan 2012

    Improving the Evaluation of Software Development Methodology Adoption and Its Impact on Enterprise Performance

    Although the literature studying Software Development Methodologies (SDMs) lists several significant positive effects of the deployment of SDMs, investments into SDMs by the enterprises remain relatively limited. Strategic investments decisions, such as SDMs investments, are mostly taken with the goal of improving enterprise performance. In this paper a model for...

    Provided By University of Ljubljana

  • White Papers // Dec 2011

    Analysis of Mobile P2P Malware Detection Framework Through Cabir & Commwarrior Families

    Mobile Peer-To-Peer (P2P) malware has emerged as one of the major challenges in mobile network security in recent years. Around four hundred mobile viruses, worms, trojans and spyware, together with approximately one thousand of their variants have been discovered to-date. So far no classification of such mobile P2P security threats...

    Provided By University of Ljubljana

  • White Papers // Sep 2011

    On the Joint Security of Encryption and Signature, Revisited

    The authors revisit the topic of joint security for combined public key schemes, wherein a single key-pair is used for both encryption and signature primitives in a secure manner. While breaking the principle of key separation, such schemes have attractive properties and are sometimes used in practice. They give a...

    Provided By University of Ljubljana

  • White Papers // May 2011

    A Survey of Security Services and Techniques in Distributed Storage Systems

    The rapid growth of data and data sharing have been driven an evolution in distributed storage infrastructure. The need for sensitive data protection and the capacity to handle massive data sets have encouraged the research and development of secure and scalable storage systems. This paper identifies major security issues and...

    Provided By University of Ljubljana

  • White Papers // Mar 2011

    Flexible Cloud Environment for Network Studies

    In this paper, the authors describe a novel cloud-based virtualization platform that provides an advanced teaching and research environment for network studies. The arrangement allows for the rapid and automated configuration of various network scenarios. The cloud architecture is explained and a typical use-case scenario is described where the cloud...

    Provided By University of Ljubljana

  • White Papers // Dec 2010

    R&D And Economic Growth In Slovenia: A Dynamic General Equilibrium Approach With Endogenous Growth

    In the paper, the authors model R&D as a major endogenous growth element in a small open economy general equilibrium framework and consider several R&D policy scenarios for Slovenia. Increase of the share of sectoral investment in R&D that is deductible from the corporate income tax and increase of government...

    Provided By University of Ljubljana

  • White Papers // Sep 2010

    An Analysis of DepenDNS

    Recently, a new scheme to protect clients against DNS cache poisoning attacks was introduced. The scheme is referred to as depenDNS and is intended to protect clients against such attacks while being secure, practical, efficient and conveniently deployable. In the authors' paper they examine the security and the operational aspects...

    Provided By University of Ljubljana

  • White Papers // Sep 2010

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes. Algebraic techniques have been successfully applied against a number of multivariate schemes and stream ciphers. Yet, their feasibility against block ciphers remains the source of much speculation. In this context,...

    Provided By University of Ljubljana

  • White Papers // Sep 2010

    Challenges for Inter Virtual Machine Communication

    Past research in virtualization technology has mainly focused on increasing isolation of co-resident virtual machines. At the same time network intensive applications, such as web services or database applications are being consolidated onto a single physical platform. The isolation properties of virtualization, however, demand a strict separation of the shared...

    Provided By University of Ljubljana

  • White Papers // Aug 2010

    Access To Finance And A Non-Monotonic Firm Expansion

    The paper studies the relationship between firms' access to capital and their domestic- and foreign-market expansion in relation to their size. The authors make use of very detailed firm balance sheets with detailed information on different sources of firms' liquidity for a population of Slovenian firms for the period 2001-2008....

    Provided By University of Ljubljana

  • White Papers // Jun 2010

    Small Is Beautiful: The Role Of Book Industries In Small European Countries

    This paper deals with four cultural and historical features of book industry that still determine the nature of book business. The paper concentrates on how these features impact book industries in linguistic communities with a relatively small number of speakers. The paper also examines the reasons for absence of the...

    Provided By University of Ljubljana

  • White Papers // May 2010

    Broadcast Encryption with Multiple Trust Authorities

    In this paper the authors extend the notion of hierarchical identity-based encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with multiple, independent trusted authorities each with their own WIBE. In this multi-trust-authority WIBE environment, a group of TA's may form coalitions, enabling...

    Provided By University of Ljubljana

  • White Papers // Apr 2010

    Benefits of Business Intelligence System Implementation: An Empirical Analysis of the Impact of Business Intelligence System Maturity on Information Quality

    The idea of this paper is to discuss the benefits and introduction of business intelligence systems for increasing and achieving high information quality. This paper discusses in detail how execution of various systems contributes to solving the issues regarding information quality. The study mentioned in this paper is based on...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Nonlinear Equivalence of Stream Ciphers

    A stream cipher is a type of encryption algorithm which encrypts individual alphabet elements of a plaintext, one at a time, with a time-varying transformation. Stream ciphers are very popular due to their many attractive features: they are generally fast, can usually be implemented efficiently in hardware, have no (or...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Understanding ISO's 9001 Benefits And Research Through An Operations Strategy Framework

    Despite the success that the ISO 9001 standard has achieved it has been extensively criticized and empirical studies have shown controversial results about its impact on performance. The authors' conceptual study was motivated by the mentioned dilemma about ISO 9001 effectiveness, and the controversy that this dilemma raises in literature...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection

    The high computational power of Graphics Processing Units (GPU) is used for several purposes nowadays. Factoring integers, computing discrete logarithms and pattern matching in network Intrusion Detection (ID) systems are popular tasks in the field of information security where GPUs are used for acceleration. GPUs are commodity components and are...

    Provided By University of Ljubljana

  • White Papers // Dec 2012

    Non-Interactive Key Exchange

    Non-Interactive Key Exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, the authors provide different security models for this primitive and explore the relationships between...

    Provided By University of Ljubljana

  • White Papers // Jan 2013

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Inspired by cold boot attacks, Heninger and Shacham (Crypto 2009) initiated the study of the problem of how to recover an RSA private key from a noisy version of that key. They gave an algorithm for the case where some bits of the private key are known with certainty. Their...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    Robust Encryption, Revisited

    The authors revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of the main motivations for the introduction of strong robustness for Public-Key Encryption (PKE) by Abdalla et al. to prevent certain types of attack on Sako's auction protocol. They show, perhaps surprisingly, that Sako's...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    There are numerous examples where it is desirable to provide differentiated access to data according to an access control policy. Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic means. In this paper, the authors present a new, enhanced security model for such schemes. They...

    Provided By University of Ljubljana

  • White Papers // Oct 2012

    A Coding Theory Foundation for the Analysis of General Unconditionally Secure Proof-of-Retrievability Schemes for Cloud

    There has been considerable recent interest in "Cloud storage" wherein a user asks a server to store a large le. One issue is whether the user can verify that the server is actually storing the le, and typically a challenge-response protocol is employed to convince the user that the le...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Are We Compromised? Modelling Security Assessment Games

    Security assessments are an integral part of organizations' strategies for protecting their digital assets and critical IT infrastructure. In this paper, the authors propose a game-theoretic modeling of a particular form of security assessment - one which addresses the question "Are the people compromised?". They do so by extending the...

    Provided By University of Ljubljana

  • White Papers // Nov 2012

    QoS-Aware Multi-Plane Routing for Future IP-Based Access Networks

    With the increasing interest in continuous media streaming applications such as audio and video, Quality of Service (QoS) is becoming more and more important. Providing QoS guarantees in packet access networks gives rise to several challenging issues. There are several aspects of QoS to be considered. For example, to support...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Adaptive Threshold for Energy Detector Based on Discrete Wavelet Packet Transform

    One promising approach to achieving high precision and low complexity in a cognitive radio system is the energy detector based on the Discrete Wavelet Packet Transform (DWPT). However, the thresholds used in previous spectrum detection algorithms are fixed values determined by false alarm probability and sample points. When the Signal...

    Provided By University of Ljubljana

  • White Papers // May 2011

    A Survey of Security Services and Techniques in Distributed Storage Systems

    The rapid growth of data and data sharing have been driven an evolution in distributed storage infrastructure. The need for sensitive data protection and the capacity to handle massive data sets have encouraged the research and development of secure and scalable storage systems. This paper identifies major security issues and...

    Provided By University of Ljubljana

  • White Papers // Jan 2013

    Negotiating Cloud Contracts: Looking at Clouds from Both Sides Now

    Contract terms for cloud computing services are evolving, driven by users' attempts to negotiate providers' standard terms to make them more suitable for their requirements, as well as market developments, particularly among cloud integrators. This paper, drawing on sources including interviews with cloud computing providers, users and other market actors,...

    Provided By University of Ljubljana

  • White Papers // Sep 2010

    Challenges for Inter Virtual Machine Communication

    Past research in virtualization technology has mainly focused on increasing isolation of co-resident virtual machines. At the same time network intensive applications, such as web services or database applications are being consolidated onto a single physical platform. The isolation properties of virtualization, however, demand a strict separation of the shared...

    Provided By University of Ljubljana

  • White Papers // Mar 2011

    Flexible Cloud Environment for Network Studies

    In this paper, the authors describe a novel cloud-based virtualization platform that provides an advanced teaching and research environment for network studies. The arrangement allows for the rapid and automated configuration of various network scenarios. The cloud architecture is explained and a typical use-case scenario is described where the cloud...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Understanding ISO's 9001 Benefits And Research Through An Operations Strategy Framework

    Despite the success that the ISO 9001 standard has achieved it has been extensively criticized and empirical studies have shown controversial results about its impact on performance. The authors' conceptual study was motivated by the mentioned dilemma about ISO 9001 effectiveness, and the controversy that this dilemma raises in literature...

    Provided By University of Ljubljana

  • White Papers // Aug 2010

    Access To Finance And A Non-Monotonic Firm Expansion

    The paper studies the relationship between firms' access to capital and their domestic- and foreign-market expansion in relation to their size. The authors make use of very detailed firm balance sheets with detailed information on different sources of firms' liquidity for a population of Slovenian firms for the period 2001-2008....

    Provided By University of Ljubljana

  • White Papers // Jan 2012

    Improving the Evaluation of Software Development Methodology Adoption and Its Impact on Enterprise Performance

    Although the literature studying Software Development Methodologies (SDMs) lists several significant positive effects of the deployment of SDMs, investments into SDMs by the enterprises remain relatively limited. Strategic investments decisions, such as SDMs investments, are mostly taken with the goal of improving enterprise performance. In this paper a model for...

    Provided By University of Ljubljana

  • White Papers // Aug 2012

    Model Checking of The Reliability of Publish/Subscribe Structure Based System

    The recent studies show that Information Centric is one of the best ways to help Internet users find useful messages among a myriad of information. With the help of a publisher/subscriber structure, users could use this Information Centric System to subscribe to messages they have interest or from the ones...

    Provided By University of Ljubljana

  • White Papers // Jan 2010

    Network Resource Availability Evaluation for IEEE802.11a/b Based WLAN Carrying Different Service Types

    A variety of wireless network technologies have been developed and deployed, including GSM/GPRS, UMTS, and WLAN. The advantages of having an integrated heterogeneous communication environment would be service convergence, joint resource management and adaptive quality of service. In such environment, operators would not need to reject the user requests, but...

    Provided By University of Ljubljana

  • White Papers // Sep 2012

    Gaming Security by Obscurity

    Shannon sought security against the attacker with unlimited computational powers: if information source conveys some information, then Shannon's attacker will surely extract that information. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the...

    Provided By University of Ljubljana

  • White Papers // May 2009

    Physics of 802.11 Wireless Networks

    This paper describes the basic physics principles of 802.11 networks. It will cover the theoretical aspects such as Maxwell equations of electromagnetic fields as well as the practical implementation of these concepts when building 802.11 networks. In everyday usage of 802.11 wireless networks the approach is mostly empirical and the...

    Provided By University of Ljubljana

  • White Papers // Dec 2009

    The Impact of Business Intelligence System Maturity on Information Quality

    With the aim to recommend and investigate the relationship between business intelligence systems and information quality, this paper examines the impact of business intelligence systems' maturity on the quality of content and media quality. This paper intends to provide suitable, related, and easy-to-use information to knowledge workers at various levels...

    Provided By University of Ljubljana

  • White Papers // Apr 2010

    Benefits of Business Intelligence System Implementation: An Empirical Analysis of the Impact of Business Intelligence System Maturity on Information Quality

    The idea of this paper is to discuss the benefits and introduction of business intelligence systems for increasing and achieving high information quality. This paper discusses in detail how execution of various systems contributes to solving the issues regarding information quality. The study mentioned in this paper is based on...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Assessing Benefits of Business Intelligence Systems - A Case Study

    Several arguments can be found in business intelligence literature that the use of business intelligence systems can bring multiple benefits, for example, via faster and easier access to information, savings in Information Technology ('IT') and greater customer satisfaction all the way through to the improved competitiveness of enterprises. Yet, most...

    Provided By University of Ljubljana

  • White Papers // Oct 2009

    Spatial Speaker: 3D Java Text-to-Speech Converter

    Text-To-Speech (TTS) converters are the key components of various types of auditory displays. Such converters are extremely useful for visually impaired computer users who depend on synthesized speech read from the computer screen or directly from the web. This paper proposes an enhancement of a Java FreeTTS speech synthesizer by...

    Provided By University of Ljubljana

  • White Papers // Sep 2009

    Information Quality Improvement As A Measure Of Business Intelligence System Benefits

    Since business intelligence systems' impact on performance is first of all long-termed and indirect, most measures of business value are not sufficiently close to immediate influence of such systems and therefore not suitable to justify investments into business intelligence systems in real business environments. Thus, measures related to increased information...

    Provided By University of Ljubljana

  • White Papers // Jun 2010

    Small Is Beautiful: The Role Of Book Industries In Small European Countries

    This paper deals with four cultural and historical features of book industry that still determine the nature of book business. The paper concentrates on how these features impact book industries in linguistic communities with a relatively small number of speakers. The paper also examines the reasons for absence of the...

    Provided By University of Ljubljana

  • White Papers // Jun 2009

    Effects of Network Dynamics on Routing Efficiency in P2P Networks

    P2P Networks are highly dynamic structures since their nodes - peer users keep joining and leaving continuously. In the paper, we study the effects of network change rates on query routing efficiency. First the authors describe some background and an abstract system model. The chosen routing technique makes use of...

    Provided By University of Ljubljana

  • White Papers // Dec 2010

    R&D And Economic Growth In Slovenia: A Dynamic General Equilibrium Approach With Endogenous Growth

    In the paper, the authors model R&D as a major endogenous growth element in a small open economy general equilibrium framework and consider several R&D policy scenarios for Slovenia. Increase of the share of sectoral investment in R&D that is deductible from the corporate income tax and increase of government...

    Provided By University of Ljubljana

  • White Papers // Apr 2013

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AEAD) schemes. These schemes are widely used and standardized, the most well known being McGrew and viega's Galois/Counter Mode (GCM). In this paper...

    Provided By University of Ljubljana

  • White Papers // Oct 2013

    Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig

    One of the recommended principles of sound cryptographic design is key separation, meaning that keys used for one purpose (e.g. encryption) should not be used for another purpose (e.g. signing). The reason is that, even if the individual uses are secure, the joint usage could be insecure. This paper shows,...

    Provided By University of Ljubljana

  • White Papers // Mar 2009

    Algebraic Techniques in Differential Cryptanalysis

    The two most established cryptanalytic methods against block ciphers are linear cryptanalysis and differential cryptanalysis. These attacks are statistical in nature, in which the attacker attempts to construct probabilistic patterns through as many rounds of the cipher as possible, in order to distinguish the cipher from a random permutation, and...

    Provided By University of Ljubljana

  • White Papers // Sep 2010

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes. Algebraic techniques have been successfully applied against a number of multivariate schemes and stream ciphers. Yet, their feasibility against block ciphers remains the source of much speculation. In this context,...

    Provided By University of Ljubljana

  • White Papers // Dec 2011

    Analysis of Mobile P2P Malware Detection Framework Through Cabir & Commwarrior Families

    Mobile Peer-To-Peer (P2P) malware has emerged as one of the major challenges in mobile network security in recent years. Around four hundred mobile viruses, worms, trojans and spyware, together with approximately one thousand of their variants have been discovered to-date. So far no classification of such mobile P2P security threats...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Constraints on Autonomous Use of Standard GPU Components for Asynchronous Observations and Intrusion Detection

    The high computational power of Graphics Processing Units (GPU) is used for several purposes nowadays. Factoring integers, computing discrete logarithms and pattern matching in network Intrusion Detection (ID) systems are popular tasks in the field of information security where GPUs are used for acceleration. GPUs are commodity components and are...

    Provided By University of Ljubljana

  • White Papers // Mar 2010

    Nonlinear Equivalence of Stream Ciphers

    A stream cipher is a type of encryption algorithm which encrypts individual alphabet elements of a plaintext, one at a time, with a time-varying transformation. Stream ciphers are very popular due to their many attractive features: they are generally fast, can usually be implemented efficiently in hardware, have no (or...

    Provided By University of Ljubljana

  • White Papers // Jun 2013

    Query Rewriting and Optimisation with Database Dependencies in Ontop

    Ontology-Based Data Access (OBDA) is regarded as a key ingredient for the new generation of information systems. In the OBDA paradigm, an ontology defines a high-level global schema and provides a vocabulary for user queries, thus isolating the user from the details of the data source structure. The authors present...

    Provided By University of Ljubljana

  • White Papers // Feb 2013

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto secure protocol of choice for Internet and mobile applications. DTLS is a variant of TLS that is growing in importance. In this paper, the authors...

    Provided By University of Ljubljana

  • White Papers // Jan 2014

    Measuring SSL and SET Against E-Commerce Consumer Requirements

    The threat of credit card fraud is arguably one of the most serious issues in e-commerce, since it makes consumers reluctant to engage in this alternative method of shopping. Most previous authors have focused on technical and business issues, whilst virtually ignoring consumer confidence. If consumers are to lose their...

    Provided By University of Ljubljana

  • White Papers // May 2013

    Consistency and Complexity Tradeoffs for Highly-Available Multi-Cloud Store

    Cloud-based storage services have established themselves as a paradigm of choice for supporting bulk storage needs of modern networked services and applications. Although individual storage service providers can be trusted to do their best to reliably store the user data, exclusive reliance on any single provider or storage service leaves...

    Provided By University of Ljubljana

  • White Papers // Nov 2013

    Plaintext Recovery Attacks Against WPA/TKIP

    The cryptographic mechanisms that aim at protecting transmitted data in modern wireless computer networks have seen an on-going evolution. The authors conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with...

    Provided By University of Ljubljana

  • White Papers // Jan 2010

    A Paradigm Shift in the Smart Card Ownership Model

    Smart cards have been proliferated into many aspects of modern life. Historically, the ownership of smart cards has remained with the smart card issuers. Although this ownership model is favored by a wide range of industries and service providers, it does not provide optimum convenience and flexibility to cardholders. One...

    Provided By University of Ljubljana