University of Luxembourg

Displaying 1-40 of 64 results

  • White Papers // Dec 2013

    A Survey on Security Issues and the Existing Solutions in Cloud Computing

    Cloud Computing is a computer model that provides services in the form of on-demand services, it's accessible for everyone, everywhere and every time, including clouds referring to the internet and the web. Cloud computing is a concept still young but not so new that. Cloud Computing has been developed to...

    Provided By University of Luxembourg

  • White Papers // Dec 2012

    User Profile-Driven Data Warehouse Summary for Adaptive OLAP Queries

    Data warehousing is an essential element of decision support systems. It aims at enabling the user knowledge to make better and faster daily business decisions. To improve this decision support system and to give more and more relevant information to the user, the need to integrate user's profiles into the...

    Provided By University of Luxembourg

  • White Papers // Oct 2012

    JooFlux: Hijacking Java 7 Invoke Dynamic to Support Live Code Modifications

    Changing functional and non-functional software implementation at runtime is useful and even sometimes critical both in development and production environments. JooFlux is a JVM agent that allows both the dynamic replacement of method implementations and the application of aspect advices. It works by doing bytecode transformation to take advantage of...

    Provided By University of Luxembourg

  • White Papers // Aug 2012

    Torinj : Automated Exploitation Malware Targeting Tor Users

    The authors propose in this paper a new propagation vector for malicious software by abusing the Tor network. Tor is particularly relevant, since operating a Tor exit node is easy and involves low costs compared to attack institutional or ISP networks. After presenting the Tor network from an attacker perspective,...

    Provided By University of Luxembourg

  • White Papers // Jun 2012

    Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation

    In this paper, the authors claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: to perform runtime monitoring, by instrumenting the application bytecode and in-vivo, i.e. directly on the Smartphone. They present a tool chain to do this and present experimental results showing...

    Provided By University of Luxembourg

  • White Papers // May 2012

    Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android

    A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need what the people call a "Permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance...

    Provided By University of Luxembourg

  • White Papers // May 2012

    A Closer Look at Security in Random Number Generators Design

    The issue of random number generation is crucial for the implementation of cryptographic systems. Random numbers are often used in key generation processes, authentication protocols, zero-knowledge protocols, padding, in many digital signature and encryption schemes, and even in some side channel attack countermeasures. For these applications, security depends to a...

    Provided By University of Luxembourg

  • White Papers // Mar 2012

    Identity-Based Encryption With Master Key-Dependent Message Security and Applications

    The authors introduce the concept of Identity-Based Encryption (IBE) with master Key-Dependent Chosen-Plaintext (mKDM-sID-CPA) security. These are IBE schemes that remain secure even after the adversary sees encryption, under some initially selected identities, of functions of the master secret key(s). They, then propose a generic construction of Chosen-Ciphertext secure Key-Dependent...

    Provided By University of Luxembourg

  • White Papers // Feb 2012

    Extended Security Arguments for (Ring) Signature Schemes

    The well-known forking lemma by Pointcheval and Stern has been used to prove the security of the so-called generic signature schemes. These signature schemes are obtained via the Fiat-Shamir transform from three-pass identification schemes. A number of five-pass identification protocols have been proposed in the last few years. Extending the...

    Provided By University of Luxembourg

  • White Papers // Feb 2012

    Simulation and Performance Analysis of Data Intensive and Workload Intensive Cloud Computing Data Centers

    Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with the increase in computing capacity. In this paper, the authors survey the main techniques behind enabling energy efficiency in data centers and present simulation environment...

    Provided By University of Luxembourg

  • White Papers // Dec 2011

    Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

    The Micro Edition is of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since, the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement...

    Provided By University of Luxembourg

  • White Papers // Dec 2011

    Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware

    The block cipher Rijndael has undergone more than ten years of extensive cryptanalysis since its submission as a candidate for the Advanced Encryption Standard (AES) in April 1998. To date, most of the publicly-known cryptanalytic results are based on reduced-round variants of the AES (respectively Rijndael) algorithm. Among the few...

    Provided By University of Luxembourg

  • White Papers // Dec 2011

    Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF

    SecureMemory (SM), CryptoMemory (CM) and CryptoRF (CR) are the Atmel chip families with wide applications in practice. They implement a proprietary stream cipher, which the authors call the Atmel cipher, to provide authenticity, confidentiality and integrity. The Atmel chips AT88SC153 and AT88SC1608, called SecureMemory (SM) family, were introduced in 1999....

    Provided By University of Luxembourg

  • White Papers // Oct 2011

    A Multi-Objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained Applications

    The authors address the problem of scheduling precedence-constrained scientific applications on a heterogeneous distributed processor system with the twin objectives of minimizing simultaneously energy consumption and schedule length. Previous research efforts on scheduling have focused on the minimization of a quality of service metric based on the completion time of...

    Provided By University of Luxembourg

  • White Papers // Oct 2011

    A Metamodel-Based Classification of Variability Modeling Approaches

    Software Product Line Engineering (SPLE) is an emerging paradigm taking momentum that proposes to address flexibility and shorter time-to-market by maximizing software reuse. The key characteristic of SPLE is the effective modelling and management of variability, for which a number of Variability Modeling (VM) techniques have been developed during the...

    Provided By University of Luxembourg

  • White Papers // Sep 2011

    BotCloud: Detecting Botnets Using MapReduce

    Botnets are a major threat of the current Internet. Understanding the novel generation of botnets relying on peer-to-peer networks is crucial for mitigating this threat. Nowadays, botnet traffic is mixed with a huge volume of benign traffic due to almost ubiquitous high speed networks. Such networks can be monitored using...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    Machine Learning Approach for IP-Flow Record Anomaly Detection

    Faced to continuous arising new threats, the detection of anomalies in current operational networks has become essential. Network operators have to deal with huge data volumes for analysis purpose. To counter this main issue, dealing with IP flow (also known as Netflow) records is common in network management. However, still...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    BotTrack: Tracking Botnets Using NetFlow and PageRank

    With large scale botnets emerging as one of the major current threats, the automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. Faced with high speed network connections, detecting botnets must be efficient and accurate. This paper proposes a novel approach for...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    Cleaning Your House First: Shifting the Paradigm on How to Secure Networks

    The standard paradigm when securing networks is to filter ingress traffic to the domain to be protected. Even though many tools and techniques have been developed and employed over the recent years for this purpose, the authors are still far from having secure networks. In this paper, they propose a...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    Energy-Efficient Scheduling on Milliclusters With Performance Constraints

    Today's datacenters and large scale enterprise computing are power hungry. A lot of research effort is devoted in industry and academy to address this challenging issue. In this paper, a new type of enterprise computing platform is being investigated. This computing platform is composed of hundred of millicomputers, each requiring...

    Provided By University of Luxembourg

  • White Papers // Jun 2011

    OLAP Visualization Operator for Complex Data

    Data warehouses and On-Line Analysis Processing (OLAP) have acknowledged and efficient solutions for helping in the decision making process. Through OLAP operators, online analysis enables the decision-maker to navigate and view data represented in a multi-dimensional manner. But when the data or objects to be analyzed are complex, it is...

    Provided By University of Luxembourg

  • White Papers // Jun 2011

    A Review on Task Performance Prediction in Multi-Core Based Systems

    Operators of data centers are faced with the challenging goal of hosting applications that meet agreed service levels, at minimal operating costs. A significant part of these costs is energy related. Successfully reaching this goal requires optimal task-to-machine assignments. This activity relies on accurate energy and performance prediction. Widespread use...

    Provided By University of Luxembourg

  • White Papers // Jun 2011

    Scalable and Energy-Efficient Scheduling Techniques for Large-Scale Systems

    The scalability of a computing system can be identified by at least three components: size, geographical distribution, and administrative constraints. Newer paradigms, such as clouds, grids, and clusters bring in more parameters to the aforementioned list, namely heterogeneity, energy consumption, and transparency. To optimize the performance of a computing system,...

    Provided By University of Luxembourg

  • White Papers // May 2011

    TrAVis to Enhance Students' Self-Monitoring in Online Learning Supported by Computer-Mediated Communication Tools

    This paper presents TrAVis (Tracking Data Analysis and Visualization Tools), a Web-based system that assists the students in visualizing their communication activities in distance learning situations. While most of the existing systems in the same genre are exclusively dedicated to the teachers, TrAVis is objectively designed and implemented for both...

    Provided By University of Luxembourg

  • White Papers // May 2011

    Energy-Aware Fast Scheduling Heuristics in Heterogeneous Computing Systems

    In heterogeneous computing systems it is crucial to schedule tasks in a manner that exploits the heterogeneity of the resources and applications to optimize systems performance. Moreover, the energy efficiency in these systems is of a great interest due to different concerns such as operational costs and environmental issues associated...

    Provided By University of Luxembourg

  • White Papers // Jan 2011

    Short and Robust Communication Paths in Dynamic Wireless Networks

    The authors consider the problem of finding and maintaining communication paths in wireless Mobile Ad hoc NETworks (MANET). They consider this problem as a bi-objective problem when trying to minimize both the length of the constructed paths and the number link reconnections. They propose two centralized algorithms that help analyze...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    On the Impossibility of Instantiating PSS in the Standard Model

    In this paper the authors consider the problem of securely instantiating Probabilistic Signature Scheme (PSS) in the standard model. PSS, proposed by Bellare and Rogaway is a widely deployed randomized signature scheme, provably secure (unforgeable under adaptively chosen message attacks) in Random Oracle Model. The main result is a black-box...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    Cryptanalysis of the RSA Subgroup Assumption From TCC 2005

    At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack considered for a subgroup of size 22?? had a complexity of O (2 ??). Accordingly, ?? = 100 bits was suggested...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    Statistical Analysis of Second Order Differential Power Analysis

    Second Order Differential Power Analysis (2ODPA) is a powerful side channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2ODPA, higher order masking may be employed but it implies an non-negligible overhead. In this context, there is a need to know how efficient a...

    Provided By University of Luxembourg

  • White Papers // Nov 2010

    Semi-Supervised Fingerprinting of Protocol Messages

    This paper addresses the fingerprinting of network devices using semi-supervised clustering. Semi-supervised clustering is a new technique that uses known and labeled data in order to assist a clustering process. The authors propose two different fingerprinting approaches. The first one is using behavioral features that are induced from a protocol...

    Provided By University of Luxembourg

  • White Papers // Nov 2010

    An Introduction to Software Engineering and Fault Tolerance

    Building systems that are trustful is one of the main challenges which soft-ware developers are facing. Dependability-related concerns have accompanied system developers since the first day these systems were built and deployed. Obviously various things have changed since then, including, the nature of faults and failures, the complexity of the...

    Provided By University of Luxembourg

  • White Papers // Oct 2010

    Rotational Rebound Attacks on Reduced Skein

    In this paper the authors combine the recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, they show that this approach can...

    Provided By University of Luxembourg

  • White Papers // Oct 2010

    50 Ways to Break RFID Privacy

    The authors present taxonomy of attacks on user privacy in RFID systems. In particular, they consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. They classify the privacy attacks according to their layer and discuss their applicability. The classification...

    Provided By University of Luxembourg

  • White Papers // Sep 2010

    Vicinity Resource Cartography for Delay-Tolerant Networks: A Holistic Perspective

    In this paper, the authors propose a distributed approach to construct vicinity resource maps at each node in a delay tolerant network. The scheme uses recent encounters to estimate the availability of the following resources: energy, buffer space, and bandwidth, in the vicinity of a given node. They then show...

    Provided By University of Luxembourg

  • White Papers // Aug 2010

    J-PAKE: Authenticated Key Exchange Without PKI

    Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research...

    Provided By University of Luxembourg

  • White Papers // Aug 2010

    Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus

    The authors formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied ? calculus. They analyze the receipt-free auction protocol by Abe and Suzuki. Bidding-price-secrecy of the protocol is verified using ProVerif, whereas receipt-freeness of the protocol is...

    Provided By University of Luxembourg

  • White Papers // Jun 2010

    Stabilizing Cluster Structures in Mobile Networks for OLSR and WCPD as Basis for Service Discovery

    Service discovery is one of the most fundamental building blocks of self-organization. While mature approaches exist in the realm of fixed networks, they are not directly applicable in the context of MANETs. The authors investigate and compare two different protocols as basis for service discovery, namely OLSR and WCPD. OLSR...

    Provided By University of Luxembourg

  • White Papers // May 2010

    TrafRoute: A Different Approach to Routing in Vehicular Networks

    In the near future vehicular networks based on wireless technology will be part of the people lives. Efficient and robust routing algorithms will play a key role in the success of such technology. In this paper, the authors present TrafRoute, an efficient and robust routing scheme for vehicular networks, suitable...

    Provided By University of Luxembourg

  • White Papers // Apr 2010

    Password Based Key Exchange With Hidden Elliptic Curve Public Parameters

    The authors here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. They prove it secure in the Bellare-Pointcheval-Rogaway (BPR) model. A significant novelty in the paper is that the proposal is conceived in such a way that it ensures that the elliptic curve public...

    Provided By University of Luxembourg

  • White Papers // Mar 2010

    Optimising Replication Versus Redundancy In Window-Aware Opportunistic Routing

    In this paper, the authors address the replication versus redundancy optimisation problem for a class of intermittently connected ad hoc networks with the following three characteristics: routing is performed by a store-carry-forward mechanism in an opportunistic manner, replication of custodian messages is used to increase the delivery ratio, and fragmentation...

    Provided By University of Luxembourg

  • White Papers // Dec 2012

    User Profile-Driven Data Warehouse Summary for Adaptive OLAP Queries

    Data warehousing is an essential element of decision support systems. It aims at enabling the user knowledge to make better and faster daily business decisions. To improve this decision support system and to give more and more relevant information to the user, the need to integrate user's profiles into the...

    Provided By University of Luxembourg

  • White Papers // Jun 2007

    Knowledge Management System for Cluster Development in Small and Medium Enterprises

    Many countries such as Canada, Japan, Korea and France gain their competitive advantage through the utilization of clusters development. A cluster contains many Small and Medium sized Enterprises (SMEs) operating in the same or similar industry strongly connected with each other to produce well and services. In developing country, especially,...

    Provided By University of Luxembourg

  • White Papers // Sep 2006

    Exposing Web Services to Business Partners: Security and Quality of Service Issue

    Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature. This paper provides solutions to manage security and QoS problems when exposing Web Services to business partners. Based on a real case study, the authors...

    Provided By University of Luxembourg

  • White Papers // May 2011

    TrAVis to Enhance Students' Self-Monitoring in Online Learning Supported by Computer-Mediated Communication Tools

    This paper presents TrAVis (Tracking Data Analysis and Visualization Tools), a Web-based system that assists the students in visualizing their communication activities in distance learning situations. While most of the existing systems in the same genre are exclusively dedicated to the teachers, TrAVis is objectively designed and implemented for both...

    Provided By University of Luxembourg

  • White Papers // Sep 2008

    Knowledge and Metadata Integration ForWarehousing Complex Data

    With the ever-growing availability of so-called complex data, especially on the Web, decision-support systems such as data warehouses must store and process data that are not only numerical or symbolic. Warehousing and analyzing such data requires the joint exploitation of metadata and domain-related knowledge, which must thereby be integrated. In...

    Provided By University of Luxembourg

  • White Papers // Mar 2006

    Materialized View Selection by Query Clustering in XML Data Warehouses

    XML data warehouses form an interesting basis for decision-support applications that exploit complex data. However, native XML database management systems currently bear limited performances and it is necessary to design strategies to optimize them. In this paper, the authors propose an automatic strategy for the selection of XML materialized views...

    Provided By University of Luxembourg

  • White Papers // Jul 2007

    An Architecture Framework for Complex Data Warehouses

    Now-a-days, many decision support applications need to exploit data that are not only numerical or symbolic, but also multimedia, multi-structure, multisource, multimodal, and/or multiversion. The authors term such data complex data. Managing and analyzing complex data involves a lot of different issues regarding their structure, storage and processing, and metadata...

    Provided By University of Luxembourg

  • White Papers // Dec 2013

    A Survey on Security Issues and the Existing Solutions in Cloud Computing

    Cloud Computing is a computer model that provides services in the form of on-demand services, it's accessible for everyone, everywhere and every time, including clouds referring to the internet and the web. Cloud computing is a concept still young but not so new that. Cloud Computing has been developed to...

    Provided By University of Luxembourg

  • White Papers // Jun 2011

    OLAP Visualization Operator for Complex Data

    Data warehouses and On-Line Analysis Processing (OLAP) have acknowledged and efficient solutions for helping in the decision making process. Through OLAP operators, online analysis enables the decision-maker to navigate and view data represented in a multi-dimensional manner. But when the data or objects to be analyzed are complex, it is...

    Provided By University of Luxembourg

  • White Papers // Jun 2009

    Algebraic Attacks on RFID Protocols

    This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concerning authentication, untraceability, and secrecy are discussed. The paper demonstrates the types of attacks by exhibiting previously unpublished vulnerabilities in several protocols and referring...

    Provided By University of Luxembourg

  • White Papers // Aug 2009

    Distinguisher and Related-Key Attack on the Full AES-256

    This paper constructs a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. It define a notion of differential q-multicollision and show that for AES-256 q-multicollisions can be constructed in time q 267 and with negligible memory, while it prove that the same task for an ideal...

    Provided By University of Luxembourg

  • White Papers // Jan 2009

    Interoperable Networking Applications for Emergency Services

    Efficient communication is a major requirement in crisis situations. This research is motivated by the need to develop new communication tools to enhance the coordination and response time of first responders. In this paper the authors present an application which enables group calls among different rescue entities. Additionally, they present...

    Provided By University of Luxembourg

  • White Papers // Dec 2009

    On a New Formal Proof Model for RFID Location Privacy

    This paper discusses a recently proposed formal proof model for RFID location privacy. The authors show that protocols which intuitively and in several other models are considered not to be location private are provably location private in this model. Conversely, the authors also show that protocols which obviously are location...

    Provided By University of Luxembourg

  • White Papers // Aug 2009

    Attacks on RFID Protocols

    This paper consists of a description of attack methodologies and a collection of detailed attacks upon RFID protocols. It is meant to serve as a quick and easy reference and it will be updated as new attacks are found. Currently the only attacks on protocols shown in full detail are...

    Provided By University of Luxembourg

  • White Papers // Jul 2009

    Untraceable RFID Protocols Are Not Trivially Composable: Attacks on the Revision of EC-RAC

    It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. This paper demonstrates this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede....

    Provided By University of Luxembourg

  • White Papers // Aug 2010

    J-PAKE: Authenticated Key Exchange Without PKI

    Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research...

    Provided By University of Luxembourg

  • White Papers // Nov 2010

    An Introduction to Software Engineering and Fault Tolerance

    Building systems that are trustful is one of the main challenges which soft-ware developers are facing. Dependability-related concerns have accompanied system developers since the first day these systems were built and deployed. Obviously various things have changed since then, including, the nature of faults and failures, the complexity of the...

    Provided By University of Luxembourg

  • White Papers // Feb 2009

    Improved Identity-Based Identification Using Correcting Codes

    One of the most critical points of Public Key Cryptography (PKC) is that of the management of the authenticity of the public key. It is the very single point that anchors public key cryptography to the real world. If no such mechanism is provided the consequences are fatal. In fact,...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    On the Impossibility of Instantiating PSS in the Standard Model

    In this paper the authors consider the problem of securely instantiating Probabilistic Signature Scheme (PSS) in the standard model. PSS, proposed by Bellare and Rogaway is a widely deployed randomized signature scheme, provably secure (unforgeable under adaptively chosen message attacks) in Random Oracle Model. The main result is a black-box...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    Cryptanalysis of the RSA Subgroup Assumption From TCC 2005

    At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack considered for a subgroup of size 22?? had a complexity of O (2 ??). Accordingly, ?? = 100 bits was suggested...

    Provided By University of Luxembourg

  • White Papers // Dec 2010

    Statistical Analysis of Second Order Differential Power Analysis

    Second Order Differential Power Analysis (2ODPA) is a powerful side channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2ODPA, higher order masking may be employed but it implies an non-negligible overhead. In this context, there is a need to know how efficient a...

    Provided By University of Luxembourg

  • White Papers // Oct 2010

    Rotational Rebound Attacks on Reduced Skein

    In this paper the authors combine the recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, they show that this approach can...

    Provided By University of Luxembourg

  • White Papers // Apr 2010

    Password Based Key Exchange With Hidden Elliptic Curve Public Parameters

    The authors here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. They prove it secure in the Bellare-Pointcheval-Rogaway (BPR) model. A significant novelty in the paper is that the proposal is conceived in such a way that it ensures that the elliptic curve public...

    Provided By University of Luxembourg

  • White Papers // Jun 2009

    Fault Attacks on RSA Signatures With Partially Unknown Messages

    Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90's, Boneh, DeMillo and Lipton introduced fault-based attacks on CRT-RSA. These attacks factor the signer's modulus when the message padding function is deterministic. However, the attack does not apply when the message is partially unknown,...

    Provided By University of Luxembourg

  • White Papers // Feb 2009

    Attacks on the DECT Authentication Mechanisms

    Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not publicly available. In this paper the authors reveal one of the two algorithms used by DECT, the DECT Standard Authentication Algorithm...

    Provided By University of Luxembourg

  • White Papers // Oct 2008

    On the Generic Construction of Identity-Based Signatures With Additional Properties

    It has been demonstrated by Bellare, Neven, and Namprempre (Eurocrypt 2004) that identity-based signature schemes can be generically constructed from standard digital signature schemes. In this paper the authors consider the following natural extension: is there a generic construction of "Identity-based signature schemes with additional properties" (such as identity-based blind...

    Provided By University of Luxembourg

  • White Papers // Apr 2009

    Minimal Message Complexity of Asynchronous Multi-Party Contract Signing

    Contract signing protocols deal with the situation where parties wish to sign a publicly-known contract text C, in a fair manner. Informally, fairness means that either every honest party obtains the signature of all the other ?−1 parties on C, or none of the parties obtain the signature of any...

    Provided By University of Luxembourg

  • White Papers // Oct 2010

    50 Ways to Break RFID Privacy

    The authors present taxonomy of attacks on user privacy in RFID systems. In particular, they consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. They classify the privacy attacks according to their layer and discuss their applicability. The classification...

    Provided By University of Luxembourg

  • White Papers // Aug 2010

    Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus

    The authors formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied ? calculus. They analyze the receipt-free auction protocol by Abe and Suzuki. Bidding-price-secrecy of the protocol is verified using ProVerif, whereas receipt-freeness of the protocol is...

    Provided By University of Luxembourg

  • White Papers // Oct 2008

    Measuring Voter-Controlled Privacy

    In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent vote buying, even when a voter chooses to renounce her privacy. In this paper, the authors distinguish various...

    Provided By University of Luxembourg

  • White Papers // Oct 2009

    Tips, Inflation Expectations And The Financial Crisis

    Previous research indicates that the US market for inflation-linked bonds is not efficient and that market inefficiencies can be exploited by informed traders who include survey estimations or inflation model forecasts in trades on break-even inflation. Results from this extended research over a time-period in which the TIPS market matured...

    Provided By University of Luxembourg

  • White Papers // Jun 2010

    Stabilizing Cluster Structures in Mobile Networks for OLSR and WCPD as Basis for Service Discovery

    Service discovery is one of the most fundamental building blocks of self-organization. While mature approaches exist in the realm of fixed networks, they are not directly applicable in the context of MANETs. The authors investigate and compare two different protocols as basis for service discovery, namely OLSR and WCPD. OLSR...

    Provided By University of Luxembourg

  • White Papers // Jan 2011

    Short and Robust Communication Paths in Dynamic Wireless Networks

    The authors consider the problem of finding and maintaining communication paths in wireless Mobile Ad hoc NETworks (MANET). They consider this problem as a bi-objective problem when trying to minimize both the length of the constructed paths and the number link reconnections. They propose two centralized algorithms that help analyze...

    Provided By University of Luxembourg

  • White Papers // Feb 2010

    A Study of Token Traversal Strategies on Tree-Based Backbones for Mobile Ad Hoc - Delay Tolerant Networks

    Tree-based backbone establishment and maintenance in Mobile Ad hoc - Delay Tolerant Networks is often operated through the use of traversing tokens. A study and framework are proposed here for various token traversal strategies on tree-based backbones. The proposed strategies execute in distributed and purely decentralized manner, and require only...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    Machine Learning Approach for IP-Flow Record Anomaly Detection

    Faced to continuous arising new threats, the detection of anomalies in current operational networks has become essential. Network operators have to deal with huge data volumes for analysis purpose. To counter this main issue, dealing with IP flow (also known as Netflow) records is common in network management. However, still...

    Provided By University of Luxembourg

  • White Papers // Aug 2011

    BotTrack: Tracking Botnets Using NetFlow and PageRank

    With large scale botnets emerging as one of the major current threats, the automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. Faced with high speed network connections, detecting botnets must be efficient and accurate. This paper proposes a novel approach for...

    Provided By University of Luxembourg

  • White Papers // Nov 2010

    Semi-Supervised Fingerprinting of Protocol Messages

    This paper addresses the fingerprinting of network devices using semi-supervised clustering. Semi-supervised clustering is a new technique that uses known and labeled data in order to assist a clustering process. The authors propose two different fingerprinting approaches. The first one is using behavioral features that are induced from a protocol...

    Provided By University of Luxembourg

  • White Papers // Sep 2008

    A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks

    Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. The latter is specially dramatic in Underwater Wireless Sensor Networks (UWSN), where the acoustic transmission mechanisms are...

    Provided By University of Luxembourg

  • White Papers // Sep 2011

    BotCloud: Detecting Botnets Using MapReduce

    Botnets are a major threat of the current Internet. Understanding the novel generation of botnets relying on peer-to-peer networks is crucial for mitigating this threat. Nowadays, botnet traffic is mixed with a huge volume of benign traffic due to almost ubiquitous high speed networks. Such networks can be monitored using...

    Provided By University of Luxembourg

  • White Papers // May 2010

    TrafRoute: A Different Approach to Routing in Vehicular Networks

    In the near future vehicular networks based on wireless technology will be part of the people lives. Efficient and robust routing algorithms will play a key role in the success of such technology. In this paper, the authors present TrafRoute, an efficient and robust routing scheme for vehicular networks, suitable...

    Provided By University of Luxembourg