University of Tsukuba

Displaying 1-7 of 7 results

  • White Papers // Jan 2013

    Improving Web Servers Focused DoS Attacks Detection

    On the Internet, web servers are often the main interface between companies or individuals and the rest of the world. As a result they represent valuable targets for attackers. Although several types of attacks are possible against web server the authors focus in this paper on flooding based denial of...

    Provided By University of Tsukuba

  • White Papers // Feb 2011

    A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO

    The authors propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-5 and Virtex-6 FPGAs. The architecture is built around a 8-bit datapath. The Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption,...

    Provided By University of Tsukuba

  • White Papers // Sep 2010

    A Multi-Modal Framework for Achieving Accountability in Multi-Agent Systems

    The authors present a multi-modal, model-theoretic framework for achieving accountability in multi-agent systems through formal proof. Their framework provides modalities for knowledge, provability, and time. With these modalities, they formalise the two main aspects of accountability, which are: soundness (accountability proper), i.e., for correct agents, the provability of their correctness...

    Provided By University of Tsukuba

  • White Papers // Jul 2010

    Interaction With Tilting Gestures in Ubiquitous Environments

    In this paper, the authors introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick interactions or that are executed in public spaces. They explored the proposed tilting interface with different application types and classified the...

    Provided By University of Tsukuba

  • White Papers // Apr 2010

    New Cryptosystems From CSP-Based Self-Distributive Systems

    The authors propose new cryptosystems based on self-distributive systems that are defined by Conjugator Searching Problems (CSP) in noncommutative groups. Under the newly developed cryptographic assumptions, the basic construction is proven IND-CPA secure in the standard model. Then, they describe two extensions: The first is proven IND-CCA secure in the...

    Provided By University of Tsukuba

  • White Papers // Feb 2010

    Pair-Wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    A Peer-to-Peer Database Management System (P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e. Mappings/ policies) for sharing data and services. Peers exchange data in a pair-wise fashion on-the-fly in response to a...

    Provided By University of Tsukuba

  • White Papers // Jan 2010

    Beauty Contests And Asset Prices Under Asymmetric Information

    In this paper, the authors study a dynamic Gaussian financial market model in which the traders form higher-order expectations about the fundamental value of a single risky asset. Rational uninformed traders are introduced into an otherwise standard differential information economy to investigate the impact of asymmetric information. In a two-period...

    Provided By University of Tsukuba

  • White Papers // Feb 2010

    Pair-Wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    A Peer-to-Peer Database Management System (P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e. Mappings/ policies) for sharing data and services. Peers exchange data in a pair-wise fashion on-the-fly in response to a...

    Provided By University of Tsukuba

  • White Papers // Apr 2010

    New Cryptosystems From CSP-Based Self-Distributive Systems

    The authors propose new cryptosystems based on self-distributive systems that are defined by Conjugator Searching Problems (CSP) in noncommutative groups. Under the newly developed cryptographic assumptions, the basic construction is proven IND-CPA secure in the standard model. Then, they describe two extensions: The first is proven IND-CCA secure in the...

    Provided By University of Tsukuba

  • White Papers // Feb 2011

    A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO

    The authors propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-5 and Virtex-6 FPGAs. The architecture is built around a 8-bit datapath. The Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption,...

    Provided By University of Tsukuba

  • White Papers // Jan 2010

    Beauty Contests And Asset Prices Under Asymmetric Information

    In this paper, the authors study a dynamic Gaussian financial market model in which the traders form higher-order expectations about the fundamental value of a single risky asset. Rational uninformed traders are introduced into an otherwise standard differential information economy to investigate the impact of asymmetric information. In a two-period...

    Provided By University of Tsukuba

  • White Papers // Jul 2010

    Interaction With Tilting Gestures in Ubiquitous Environments

    In this paper, the authors introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick interactions or that are executed in public spaces. They explored the proposed tilting interface with different application types and classified the...

    Provided By University of Tsukuba

  • White Papers // Sep 2010

    A Multi-Modal Framework for Achieving Accountability in Multi-Agent Systems

    The authors present a multi-modal, model-theoretic framework for achieving accountability in multi-agent systems through formal proof. Their framework provides modalities for knowledge, provability, and time. With these modalities, they formalise the two main aspects of accountability, which are: soundness (accountability proper), i.e., for correct agents, the provability of their correctness...

    Provided By University of Tsukuba

  • White Papers // Jan 2013

    Improving Web Servers Focused DoS Attacks Detection

    On the Internet, web servers are often the main interface between companies or individuals and the rest of the world. As a result they represent valuable targets for attackers. Although several types of attacks are possible against web server the authors focus in this paper on flooding based denial of...

    Provided By University of Tsukuba