University of Tsukuba

Displaying 1-11 of 11 results

  • White Papers // Jan 2013

    Improving Web Servers Focused DoS Attacks Detection

    On the Internet, web servers are often the main interface between companies or individuals and the rest of the world. As a result they represent valuable targets for attackers. Although several types of attacks are possible against web server the authors focus in this paper on flooding based denial of...

    Provided By University of Tsukuba

  • White Papers // Feb 2011

    A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO

    The authors propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-5 and Virtex-6 FPGAs. The architecture is built around a 8-bit datapath. The Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption,...

    Provided By University of Tsukuba

  • White Papers // Sep 2010

    A Multi-Modal Framework for Achieving Accountability in Multi-Agent Systems

    The authors present a multi-modal, model-theoretic framework for achieving accountability in multi-agent systems through formal proof. Their framework provides modalities for knowledge, provability, and time. With these modalities, they formalise the two main aspects of accountability, which are: soundness (accountability proper), i.e., for correct agents, the provability of their correctness...

    Provided By University of Tsukuba

  • White Papers // Jul 2010

    Interaction With Tilting Gestures in Ubiquitous Environments

    In this paper, the authors introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick interactions or that are executed in public spaces. They explored the proposed tilting interface with different application types and classified the...

    Provided By University of Tsukuba

  • White Papers // Apr 2010

    New Cryptosystems From CSP-Based Self-Distributive Systems

    The authors propose new cryptosystems based on self-distributive systems that are defined by Conjugator Searching Problems (CSP) in noncommutative groups. Under the newly developed cryptographic assumptions, the basic construction is proven IND-CPA secure in the standard model. Then, they describe two extensions: The first is proven IND-CCA secure in the...

    Provided By University of Tsukuba

  • White Papers // Feb 2010

    Pair-Wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    A Peer-to-Peer Database Management System (P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e. Mappings/ policies) for sharing data and services. Peers exchange data in a pair-wise fashion on-the-fly in response to a...

    Provided By University of Tsukuba

  • White Papers // Jan 2010

    Beauty Contests And Asset Prices Under Asymmetric Information

    In this paper, the authors study a dynamic Gaussian financial market model in which the traders form higher-order expectations about the fundamental value of a single risky asset. Rational uninformed traders are introduced into an otherwise standard differential information economy to investigate the impact of asymmetric information. In a two-period...

    Provided By University of Tsukuba

  • White Papers // Jun 2009

    Enhancement of e-Commerce Via Mobile Accesses to the Internet

    The potential of the Internet has been expanded substantially by a new generation of mobile devices, opening the door for rapid growth of m-commerce. While the traditional PC access to the Internet continues to be vital for exploiting the advantages of the Internet, the mobile access appears to attract more...

    Provided By University of Tsukuba

  • White Papers // Apr 2009

    Dismantling The Ancien Regime: Public Service Liberalization In The EU And The Vulnerability Of Sector Regimes

    How is it possible for public services to be liberalized in the EU despite a history of strong government control? Much of the literature on this issue has developed around the argument over the impact of EU institutions on the liberalization process. But the fact that liberalization is not an...

    Provided By University of Tsukuba

  • White Papers // Apr 2009

    Strongly Unforgeable ID-Based Signatures Without Random Oracles

    In this paper, the authors construct a strongly unforgeable ID-based signature scheme without random oracles. The signature size of the scheme is smaller than that of other schemes based on varieties of the Diffie - Hellman problem or the discrete logarithm problem. The security of the scheme relies on the...

    Provided By University of Tsukuba

  • White Papers // Jan 2009

    Memory Management of Density-Based Spam Detector

    The volume of mass unsolicited electronic mail, often known as spam, has recently increased enormously and has become a serious threat to not only the Internet but also to society. A new spam detection method which uses document space density information has been proposed. Although the proposed method requires extensive...

    Provided By University of Tsukuba

  • White Papers // Jan 2009

    Memory Management of Density-Based Spam Detector

    The volume of mass unsolicited electronic mail, often known as spam, has recently increased enormously and has become a serious threat to not only the Internet but also to society. A new spam detection method which uses document space density information has been proposed. Although the proposed method requires extensive...

    Provided By University of Tsukuba

  • White Papers // Jun 2009

    Enhancement of e-Commerce Via Mobile Accesses to the Internet

    The potential of the Internet has been expanded substantially by a new generation of mobile devices, opening the door for rapid growth of m-commerce. While the traditional PC access to the Internet continues to be vital for exploiting the advantages of the Internet, the mobile access appears to attract more...

    Provided By University of Tsukuba

  • White Papers // Apr 2009

    Dismantling The Ancien Regime: Public Service Liberalization In The EU And The Vulnerability Of Sector Regimes

    How is it possible for public services to be liberalized in the EU despite a history of strong government control? Much of the literature on this issue has developed around the argument over the impact of EU institutions on the liberalization process. But the fact that liberalization is not an...

    Provided By University of Tsukuba

  • White Papers // Feb 2010

    Pair-Wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    A Peer-to-Peer Database Management System (P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e. Mappings/ policies) for sharing data and services. Peers exchange data in a pair-wise fashion on-the-fly in response to a...

    Provided By University of Tsukuba

  • White Papers // Jan 2010

    Beauty Contests And Asset Prices Under Asymmetric Information

    In this paper, the authors study a dynamic Gaussian financial market model in which the traders form higher-order expectations about the fundamental value of a single risky asset. Rational uninformed traders are introduced into an otherwise standard differential information economy to investigate the impact of asymmetric information. In a two-period...

    Provided By University of Tsukuba

  • White Papers // Feb 2011

    A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO

    The authors propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-5 and Virtex-6 FPGAs. The architecture is built around a 8-bit datapath. The Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption,...

    Provided By University of Tsukuba

  • White Papers // Apr 2010

    New Cryptosystems From CSP-Based Self-Distributive Systems

    The authors propose new cryptosystems based on self-distributive systems that are defined by Conjugator Searching Problems (CSP) in noncommutative groups. Under the newly developed cryptographic assumptions, the basic construction is proven IND-CPA secure in the standard model. Then, they describe two extensions: The first is proven IND-CCA secure in the...

    Provided By University of Tsukuba

  • White Papers // Apr 2009

    Strongly Unforgeable ID-Based Signatures Without Random Oracles

    In this paper, the authors construct a strongly unforgeable ID-based signature scheme without random oracles. The signature size of the scheme is smaller than that of other schemes based on varieties of the Diffie - Hellman problem or the discrete logarithm problem. The security of the scheme relies on the...

    Provided By University of Tsukuba

  • White Papers // Sep 2010

    A Multi-Modal Framework for Achieving Accountability in Multi-Agent Systems

    The authors present a multi-modal, model-theoretic framework for achieving accountability in multi-agent systems through formal proof. Their framework provides modalities for knowledge, provability, and time. With these modalities, they formalise the two main aspects of accountability, which are: soundness (accountability proper), i.e., for correct agents, the provability of their correctness...

    Provided By University of Tsukuba

  • White Papers // Jul 2010

    Interaction With Tilting Gestures in Ubiquitous Environments

    In this paper, the authors introduce a tilting interface that controls direction based applications in ubiquitous environments. A tilt interface is useful for situations that require remote and quick interactions or that are executed in public spaces. They explored the proposed tilting interface with different application types and classified the...

    Provided By University of Tsukuba

  • White Papers // Jan 2013

    Improving Web Servers Focused DoS Attacks Detection

    On the Internet, web servers are often the main interface between companies or individuals and the rest of the world. As a result they represent valuable targets for attackers. Although several types of attacks are possible against web server the authors focus in this paper on flooding based denial of...

    Provided By University of Tsukuba