University of Salamanca

Displaying 1-7 of 7 results

  • White Papers // Apr 2014

    PExy: The Other Side of Exploit Kits

    The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. The authors are now dealing with exploit kits....

    Provided By University of Salamanca

  • White Papers // Sep 2012

    Impossibility Results for Static Input Secure Computation

    Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob...

    Provided By University of Salamanca

  • White Papers // Aug 2012

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

    In this paper, the authors focus on a simple database commitment functionality where besides the standard security properties, one would like to hide the size of the input of the sender. Hiding the size of the input of a player is a critical requirement in some applications, and relatively few...

    Provided By University of Salamanca

  • White Papers // Feb 2012

    Hiding Information Into OOXML Documents: New Steganographic Perspectives

    In this paper, the authors, starting from the classification of information hiding adapted from Bauer, analyze four new methods for embedding data into the OOXML file format. These methods can be extremely useful when using MS-Office documents for steganographic purposes. The authors, analyzing a scenario composed of about 50.000 MS-Office...

    Provided By University of Salamanca

  • White Papers // Mar 2010

    Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments

    When commitment schemes are used in complex environments, e.g., the internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to ones committed to by honest players. In the plain model, the current best solution towards resolving this problem in a constant number...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare

    Ambient Intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system aimed at improving healthcare and assistance to dependent people at their homes. The system implements a SOA-based platform which allows heterogeneous Wireless Sensor Networks to communicate...

    Provided By University of Salamanca

  • White Papers // May 2007

    Validating Orchestration of Web Services with BPEL and Aggregate Signatures

    Web Services technology provides software developers with a wide range of tools and models to produce innovative distributed applications. In this paper, the authors present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. They address a recent cryptographic tool, aggregate signatures, to...

    Provided By University of Salamanca

  • White Papers // Sep 2009

    Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare

    Ambient Intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system aimed at improving healthcare and assistance to dependent people at their homes. The system implements a SOA-based platform which allows heterogeneous Wireless Sensor Networks to communicate...

    Provided By University of Salamanca

  • White Papers // Aug 2012

    Secure Database Commitments and Universal Arguments of Quasi Knowledge

    In this paper, the authors focus on a simple database commitment functionality where besides the standard security properties, one would like to hide the size of the input of the sender. Hiding the size of the input of a player is a critical requirement in some applications, and relatively few...

    Provided By University of Salamanca

  • White Papers // Sep 2012

    Impossibility Results for Static Input Secure Computation

    Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob...

    Provided By University of Salamanca

  • White Papers // May 2007

    Validating Orchestration of Web Services with BPEL and Aggregate Signatures

    Web Services technology provides software developers with a wide range of tools and models to produce innovative distributed applications. In this paper, the authors present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. They address a recent cryptographic tool, aggregate signatures, to...

    Provided By University of Salamanca

  • White Papers // Feb 2012

    Hiding Information Into OOXML Documents: New Steganographic Perspectives

    In this paper, the authors, starting from the classification of information hiding adapted from Bauer, analyze four new methods for embedding data into the OOXML file format. These methods can be extremely useful when using MS-Office documents for steganographic purposes. The authors, analyzing a scenario composed of about 50.000 MS-Office...

    Provided By University of Salamanca

  • White Papers // Mar 2010

    Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments

    When commitment schemes are used in complex environments, e.g., the internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to ones committed to by honest players. In the plain model, the current best solution towards resolving this problem in a constant number...

    Provided By University of Salamanca

  • White Papers // Apr 2014

    PExy: The Other Side of Exploit Kits

    The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of malicious pages by individuals has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. The authors are now dealing with exploit kits....

    Provided By University of Salamanca