University of Salamanca

Displaying 1-9 of 9 results

  • White Papers // Apr 2014

    PExy: The Other Side of Exploit Kits

    The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. The authors are now dealing with exploit kits....

    Provided By University of Salamanca

  • White Papers // Sep 2012

    Impossibility Results for Static Input Secure Computation

    Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob...

    Provided By University of Salamanca

  • White Papers // Aug 2012

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

    In this paper, the authors focus on a simple database commitment functionality where besides the standard security properties, one would like to hide the size of the input of the sender. Hiding the size of the input of a player is a critical requirement in some applications, and relatively few...

    Provided By University of Salamanca

  • White Papers // Feb 2012

    Hiding Information Into OOXML Documents: New Steganographic Perspectives

    In this paper, the authors, starting from the classification of information hiding adapted from Bauer, analyze four new methods for embedding data into the OOXML file format. These methods can be extremely useful when using MS-Office documents for steganographic purposes. The authors, analyzing a scenario composed of about 50.000 MS-Office...

    Provided By University of Salamanca

  • White Papers // Mar 2010

    Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments

    When commitment schemes are used in complex environments, e.g., the internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to ones committed to by honest players. In the plain model, the current best solution towards resolving this problem in a constant number...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare

    Ambient Intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system aimed at improving healthcare and assistance to dependent people at their homes. The system implements a SOA-based platform which allows heterogeneous Wireless Sensor Networks to communicate...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Receding Horizon Decoding of Convolutional Codes

    Decoding of convolutional codes poses a significant challenge for coding theory. Classical methods, based on e.g. Viterbi decoding, suffer from being computationally expensive and are restricted therefore to codes of small complexity. Based on analogies with model predictive optimal control, the authors propose a new iterative method for convolutional decoding...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    A Hybrid Agent-Based Classification Mechanism to Detect Denial of Service Attacks

    This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web Services. One of the most common attacks requiring novel solutions is the Denial of Service attack (DoS),...

    Provided By University of Salamanca

  • White Papers // May 2007

    Validating Orchestration of Web Services with BPEL and Aggregate Signatures

    Web Services technology provides software developers with a wide range of tools and models to produce innovative distributed applications. In this paper, the authors present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. They address a recent cryptographic tool, aggregate signatures, to...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare

    Ambient Intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system aimed at improving healthcare and assistance to dependent people at their homes. The system implements a SOA-based platform which allows heterogeneous Wireless Sensor Networks to communicate...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    A Hybrid Agent-Based Classification Mechanism to Detect Denial of Service Attacks

    This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web Services. One of the most common attacks requiring novel solutions is the Denial of Service attack (DoS),...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Receding Horizon Decoding of Convolutional Codes

    Decoding of convolutional codes poses a significant challenge for coding theory. Classical methods, based on e.g. Viterbi decoding, suffer from being computationally expensive and are restricted therefore to codes of small complexity. Based on analogies with model predictive optimal control, the authors propose a new iterative method for convolutional decoding...

    Provided By University of Salamanca

  • White Papers // May 2007

    Validating Orchestration of Web Services with BPEL and Aggregate Signatures

    Web Services technology provides software developers with a wide range of tools and models to produce innovative distributed applications. In this paper, the authors present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. They address a recent cryptographic tool, aggregate signatures, to...

    Provided By University of Salamanca

  • White Papers // Mar 2010

    Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments

    When commitment schemes are used in complex environments, e.g., the internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to ones committed to by honest players. In the plain model, the current best solution towards resolving this problem in a constant number...

    Provided By University of Salamanca

  • White Papers // Apr 2014

    PExy: The Other Side of Exploit Kits

    The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. The authors are now dealing with exploit kits....

    Provided By University of Salamanca

  • White Papers // Aug 2012

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

    In this paper, the authors focus on a simple database commitment functionality where besides the standard security properties, one would like to hide the size of the input of the sender. Hiding the size of the input of a player is a critical requirement in some applications, and relatively few...

    Provided By University of Salamanca

  • White Papers // Sep 2012

    Impossibility Results for Static Input Secure Computation

    Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob...

    Provided By University of Salamanca

  • White Papers // Feb 2012

    Hiding Information Into OOXML Documents: New Steganographic Perspectives

    In this paper, the authors, starting from the classification of information hiding adapted from Bauer, analyze four new methods for embedding data into the OOXML file format. These methods can be extremely useful when using MS-Office documents for steganographic purposes. The authors, analyzing a scenario composed of about 50.000 MS-Office...

    Provided By University of Salamanca