University of Trier

Displaying 1-11 of 11 results

  • White Papers // May 2012

    A Novel SIR-Based Access Scheme for Multi-Packet Communication in 802.11 Networks

    This paper proposes a novel Medium Access Control (MAC) protocol for enabling multiple simultaneous communications in 802.11 networks where the nodes can use adaptive antenna arrays. The presented scheme is backward compatible with the 802.11 standard and is designed for heterogeneous scenarios, where legacy and non-legacy nodes equipped with different...

    Provided By University of Trier

  • White Papers // Mar 2012

    A Framework for the Cryptographic Verification of Java-Like Programs

    The authors consider the problem of establishing cryptographic guarantees - in particular, computational indistinguishability - for Java or Java-like programs that use cryptography. For this purpose, they propose a general framework that enables existing program analysis tools that can check (standard) non-interference properties of Java programs to establish cryptographic security...

    Provided By University of Trier

  • White Papers // Mar 2012

    Clash Attacks on the Verifiability of E-Voting Systems

    Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means that voters can check that their votes were actually counted and that the published result of the election is correct, even if the voting machine/authorities are (partially) untrusted. In this paper, the authors raise awareness of a simple...

    Provided By University of Trier

  • White Papers // Dec 2010

    The Dynamics Of Financial Crises And The Risk To Defend The Exchange Rate

    Despite major recent advance in the literature on financial crises, the key role of central banks in the dynamics of financial crises is still not well understood. The authors aim is to contribute to a better understanding of the dynamics of financial crises by explicitly modeling the strategic options of...

    Provided By University of Trier

  • White Papers // Oct 2010

    Ideal Key Derivation and Encryption in Simulation-Based Security

    Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a composable way, in this paper the authors extend an ideal functionality for symmetric and public-key encryption proposed in previous work by a...

    Provided By University of Trier

  • White Papers // Nov 2009

    A Game-Based Definition of Coercion-Resistance and Its Applications

    Coercion-resistance is one of the most important and intricate security requirements for voting protocols. Several definitions of coercion-resistance have been proposed in the literature, both in cryptographic settings and more abstract, symbolic models. However, unlike symbolic approaches, only very few voting protocols have been rigorously analyzed within the cryptographic setting....

    Provided By University of Trier

  • White Papers // Oct 2009

    Measuring Organizational Capital

    Firms develop their organizational practices to realize returns from given and marketable resources. Implementing effective practices requires substantial up-front investment. The authors approximate the economic relevance of establishment-specific organizational capital by using a two-step procedure. First, they extract an establishment-specific performance differential from a within-panel estimator. Second, they explain the...

    Provided By University of Trier

  • White Papers // Apr 2009

    Using ProVerif to Analyze Protocols With Diffie-Hellman Exponentiation

    ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the eXclusive OR (XOR) and Diffie-Hellman exponentiation has been problematic. Recently, the authors have developed an approach which enables ProVerif, and related tools, to analyze a large class of...

    Provided By University of Trier

  • White Papers // Mar 2009

    Bulwark, Trojan Horse Or What? Citizen's Attitudes Towards The EU's Role In The Process of Globalization

    The current wave of globalization until 2008 was characterized by unprecedented worldwide flows of goods, capital, people, information, and ideas. So is European integration on a regional geographic scale. In the growing body of literature on the relationship between the globalization and European integration, the latter is often portrayed as...

    Provided By University of Trier

  • White Papers // Feb 2009

    HyperVerse: Simulation and Testbed Reconciled

    When dealing with dynamic large-scale topologies such as those underlying Peer-To-Peer (P2P) Distributed Virtual Environments (DVE), one inescapably reaches the point where either simulations lack human behavior and assessment or where practical experiments on a small scale do not yield significant results. The restrictions resulting from the separation of simulation...

    Provided By University of Trier

  • White Papers // Feb 2009

    Universally Composable Symmetric Encryption

    For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations. Surprisingly, however, no such functionality exists for symmetric encryption, except for a more abstract Dolev-Yao...

    Provided By University of Trier

  • White Papers // Mar 2009

    Bulwark, Trojan Horse Or What? Citizen's Attitudes Towards The EU's Role In The Process of Globalization

    The current wave of globalization until 2008 was characterized by unprecedented worldwide flows of goods, capital, people, information, and ideas. So is European integration on a regional geographic scale. In the growing body of literature on the relationship between the globalization and European integration, the latter is often portrayed as...

    Provided By University of Trier

  • White Papers // Oct 2010

    Ideal Key Derivation and Encryption in Simulation-Based Security

    Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a composable way, in this paper the authors extend an ideal functionality for symmetric and public-key encryption proposed in previous work by a...

    Provided By University of Trier

  • White Papers // Nov 2009

    A Game-Based Definition of Coercion-Resistance and Its Applications

    Coercion-resistance is one of the most important and intricate security requirements for voting protocols. Several definitions of coercion-resistance have been proposed in the literature, both in cryptographic settings and more abstract, symbolic models. However, unlike symbolic approaches, only very few voting protocols have been rigorously analyzed within the cryptographic setting....

    Provided By University of Trier

  • White Papers // Feb 2009

    Universally Composable Symmetric Encryption

    For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities have been formulated in the simulation-based security approach, along with their realizations. Surprisingly, however, no such functionality exists for symmetric encryption, except for a more abstract Dolev-Yao...

    Provided By University of Trier

  • White Papers // Apr 2009

    Using ProVerif to Analyze Protocols With Diffie-Hellman Exponentiation

    ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the eXclusive OR (XOR) and Diffie-Hellman exponentiation has been problematic. Recently, the authors have developed an approach which enables ProVerif, and related tools, to analyze a large class of...

    Provided By University of Trier

  • White Papers // Dec 2010

    The Dynamics Of Financial Crises And The Risk To Defend The Exchange Rate

    Despite major recent advance in the literature on financial crises, the key role of central banks in the dynamics of financial crises is still not well understood. The authors aim is to contribute to a better understanding of the dynamics of financial crises by explicitly modeling the strategic options of...

    Provided By University of Trier

  • White Papers // Oct 2009

    Measuring Organizational Capital

    Firms develop their organizational practices to realize returns from given and marketable resources. Implementing effective practices requires substantial up-front investment. The authors approximate the economic relevance of establishment-specific organizational capital by using a two-step procedure. First, they extract an establishment-specific performance differential from a within-panel estimator. Second, they explain the...

    Provided By University of Trier

  • White Papers // Feb 2009

    HyperVerse: Simulation and Testbed Reconciled

    When dealing with dynamic large-scale topologies such as those underlying Peer-To-Peer (P2P) Distributed Virtual Environments (DVE), one inescapably reaches the point where either simulations lack human behavior and assessment or where practical experiments on a small scale do not yield significant results. The restrictions resulting from the separation of simulation...

    Provided By University of Trier

  • White Papers // Mar 2012

    A Framework for the Cryptographic Verification of Java-Like Programs

    The authors consider the problem of establishing cryptographic guarantees - in particular, computational indistinguishability - for Java or Java-like programs that use cryptography. For this purpose, they propose a general framework that enables existing program analysis tools that can check (standard) non-interference properties of Java programs to establish cryptographic security...

    Provided By University of Trier

  • White Papers // Mar 2012

    Clash Attacks on the Verifiability of E-Voting Systems

    Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means that voters can check that their votes were actually counted and that the published result of the election is correct, even if the voting machine/authorities are (partially) untrusted. In this paper, the authors raise awareness of a simple...

    Provided By University of Trier

  • White Papers // May 2012

    A Novel SIR-Based Access Scheme for Multi-Packet Communication in 802.11 Networks

    This paper proposes a novel Medium Access Control (MAC) protocol for enabling multiple simultaneous communications in 802.11 networks where the nodes can use adaptive antenna arrays. The presented scheme is backward compatible with the 802.11 standard and is designed for heterogeneous scenarios, where legacy and non-legacy nodes equipped with different...

    Provided By University of Trier