University of Verona

Displaying 1-13 of 13 results

  • White Papers // May 2012

    EDES- Efficient Dynamic Selective Encryption Framework to Secure Multimedia Traffic in Wireless Sensor Networks

    In this paper, the authors propose a new framework able to ensure security, multimedia quality and energy efficiency in Multimedia Wireless Sensor Networks (MWSNs). The energy is an important and limited resource, which has a direct impact on the lifetime of nodes in MWSNs. In addition, the characteristics of MWSNs...

    Provided By University of Verona

  • White Papers // Feb 2012

    Peer-Assisted Content Distribution on a Budget

    In this paper, the authors propose a general framework and present a prototype implementation of peer-assisted content delivery application. Their system - called Cyclops - dynamically adjusts the bandwidth consumed by content servers (which represents the bulk of content delivery costs) to feed a set of swarming clients, based on...

    Provided By University of Verona

  • White Papers // Jan 2012

    A Semantic Analysis of Wireless Network Security Protocols

    Gorrieri and Martinelli's tGNDC schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. The authors generalise the tGNDC schema to verify wireless network security protocols. Their generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms...

    Provided By University of Verona

  • White Papers // Sep 2011

    A Timed Calculus for Wireless Systems

    The authors propose a timed broadcasting process calculus for wireless systems where time-consuming communications are exposed to collisions. The operational semantics of their calculus is given in terms of a labeled transition system. The calculus enjoys a number of desirable time properties such as time determinism: the passage of time...

    Provided By University of Verona

  • White Papers // Sep 2011

    A Calculus of Trustworthy Ad Hoc Networks

    The authors propose a process calculus for mobile ad hoc networks which relies on an abstract behaviour-based multilevel trust model. The operational semantics of the calculus is given in terms of a labelled transition system, where actions are executed at a certain security level. They define a labelled bisimilarity over...

    Provided By University of Verona

  • White Papers // Jun 2011

    Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, the authors propose a compositional analysis technique to study formal probabilistic models of gossip protocols in the context of wireless sensor networks. They introduce a simple probabilistic timed process calculus...

    Provided By University of Verona

  • White Papers // Mar 2011

    Financial Development And Innovation In China: Evidence From The Provincial Data

    This paper investigates the role of regional financial development, in addition to FDI, for regional innovation in China, using a more recent provincial dataset and more sophisticated panel data estimation techniques than those available in the literature. Two aspects of regional financial system development are considered: its financial depth and...

    Provided By University of Verona

  • White Papers // Jan 2011

    Adding Preferences to Semantic Process Model Matchmaking

    The capability to easily find useful services satisfying non-functional constraints is critical for building service oriented systems. Current approaches for service retrieval with these kinds of constraints are mostly limited to atomic services. However, these approaches are not sufficient and do not fulfill user needs since many non-functional factors are...

    Provided By University of Verona

  • White Papers // Oct 2010

    On the Robustness of BitTorrent Swarms to Greedy Peers

    The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruism of the original version of BitTorrent in order to maximize the benefit of participating to a torrent. In this paper, the authors study...

    Provided By University of Verona

  • White Papers // Sep 2010

    Cloud-Based Content Distribution on a Budget

    Cloud computing has emerged as a compelling paradigm for deploying Information and Communication Technology (ICT) solutions on the Internet, because it enables solution providers to easily scale up or down, or migrate their offerings seamlessly across resources - computer servers, storage, platforms, and services - offered by one or more...

    Provided By University of Verona

  • White Papers // Jul 2010

    Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA

    Several different secure routing protocols have been proposed for determining the appropriate paths on which data should be transmitted in ad hoc networks. In this paper, authors focus on two of the most relevant such protocols, ARAN and endairA, and present the results of a formal analysis that authors have...

    Provided By University of Verona

  • White Papers // Dec 2009

    Passive Online RTT Estimation for Flow-Aware Routers Using One-Way Traffic

    With the introduction of new generation high speed routers, and with the help of "Flow-aware" traffic management, it becomes possible to improve the Quality of Service for users as well as the network efficiency for ISPs. An example of the "Flow-aware" traffic management is the Alcatel-Lucent "Semantic Networking" framework where...

    Provided By University of Verona

  • White Papers // Jan 2009

    On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis

    The authors totally break a large class of cryptosystems based on imaginary quadratic field arithmetic, whose main interest was the quadratic complexity of the secret operation. This polynomial time attack shows that skep and the kernel problem are not suited to build cryptosystems and lessen the number of public-key cryptosystems...

    Provided By University of Verona

  • White Papers // Jul 2010

    Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA

    Several different secure routing protocols have been proposed for determining the appropriate paths on which data should be transmitted in ad hoc networks. In this paper, authors focus on two of the most relevant such protocols, ARAN and endairA, and present the results of a formal analysis that authors have...

    Provided By University of Verona

  • White Papers // Sep 2010

    Cloud-Based Content Distribution on a Budget

    Cloud computing has emerged as a compelling paradigm for deploying Information and Communication Technology (ICT) solutions on the Internet, because it enables solution providers to easily scale up or down, or migrate their offerings seamlessly across resources - computer servers, storage, platforms, and services - offered by one or more...

    Provided By University of Verona

  • White Papers // Mar 2011

    Financial Development And Innovation In China: Evidence From The Provincial Data

    This paper investigates the role of regional financial development, in addition to FDI, for regional innovation in China, using a more recent provincial dataset and more sophisticated panel data estimation techniques than those available in the literature. Two aspects of regional financial system development are considered: its financial depth and...

    Provided By University of Verona

  • White Papers // Jun 2011

    Semantic Analysis of Gossip Protocols for Wireless Sensor Networks

    Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, the authors propose a compositional analysis technique to study formal probabilistic models of gossip protocols in the context of wireless sensor networks. They introduce a simple probabilistic timed process calculus...

    Provided By University of Verona

  • White Papers // Sep 2011

    A Calculus of Trustworthy Ad Hoc Networks

    The authors propose a process calculus for mobile ad hoc networks which relies on an abstract behaviour-based multilevel trust model. The operational semantics of the calculus is given in terms of a labelled transition system, where actions are executed at a certain security level. They define a labelled bisimilarity over...

    Provided By University of Verona

  • White Papers // Sep 2011

    A Timed Calculus for Wireless Systems

    The authors propose a timed broadcasting process calculus for wireless systems where time-consuming communications are exposed to collisions. The operational semantics of their calculus is given in terms of a labeled transition system. The calculus enjoys a number of desirable time properties such as time determinism: the passage of time...

    Provided By University of Verona

  • White Papers // Feb 2012

    Peer-Assisted Content Distribution on a Budget

    In this paper, the authors propose a general framework and present a prototype implementation of peer-assisted content delivery application. Their system - called Cyclops - dynamically adjusts the bandwidth consumed by content servers (which represents the bulk of content delivery costs) to feed a set of swarming clients, based on...

    Provided By University of Verona

  • White Papers // Jan 2011

    Adding Preferences to Semantic Process Model Matchmaking

    The capability to easily find useful services satisfying non-functional constraints is critical for building service oriented systems. Current approaches for service retrieval with these kinds of constraints are mostly limited to atomic services. However, these approaches are not sufficient and do not fulfill user needs since many non-functional factors are...

    Provided By University of Verona

  • White Papers // Jan 2009

    On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis

    The authors totally break a large class of cryptosystems based on imaginary quadratic field arithmetic, whose main interest was the quadratic complexity of the secret operation. This polynomial time attack shows that skep and the kernel problem are not suited to build cryptosystems and lessen the number of public-key cryptosystems...

    Provided By University of Verona

  • White Papers // Dec 2009

    Passive Online RTT Estimation for Flow-Aware Routers Using One-Way Traffic

    With the introduction of new generation high speed routers, and with the help of "Flow-aware" traffic management, it becomes possible to improve the Quality of Service for users as well as the network efficiency for ISPs. An example of the "Flow-aware" traffic management is the Alcatel-Lucent "Semantic Networking" framework where...

    Provided By University of Verona

  • White Papers // May 2012

    EDES- Efficient Dynamic Selective Encryption Framework to Secure Multimedia Traffic in Wireless Sensor Networks

    In this paper, the authors propose a new framework able to ensure security, multimedia quality and energy efficiency in Multimedia Wireless Sensor Networks (MWSNs). The energy is an important and limited resource, which has a direct impact on the lifetime of nodes in MWSNs. In addition, the characteristics of MWSNs...

    Provided By University of Verona

  • White Papers // Jan 2012

    A Semantic Analysis of Wireless Network Security Protocols

    Gorrieri and Martinelli's tGNDC schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. The authors generalise the tGNDC schema to verify wireless network security protocols. Their generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms...

    Provided By University of Verona

  • White Papers // Oct 2010

    On the Robustness of BitTorrent Swarms to Greedy Peers

    The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruism of the original version of BitTorrent in order to maximize the benefit of participating to a torrent. In this paper, the authors study...

    Provided By University of Verona