University of Waterloo

Displaying 121-158 of 158 results

  • White Papers // Jun 2010

    Resource and Service Discovery in Large-Scale Multi-Domain Networks

    With the increasing need for networked applications and distributed resource sharing, there is a strong incentive for an open large-scale service infrastructure operating over multi-domain and multi-technology networks. Service discovery, as an essential support function of such an infrastructure, is a crucial current research challenge. Although a few survey papers...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    An Adaptive Idle-Wait Countermeasure Against Timing Attacks on Public-Key Cryptosystems

    Successful timing attacks against public-key cryptosystems have been demonstrated in many forms, suggesting the use of a technique known as blinding as countermeasure to these attacks. An alternative countermeasure has been considered, though somewhat overlooked and less studied in existing literature, consisting of idle-wait to make the decryption time independent...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 Based Processors

    Elliptic Curve Cryptography (ECC), discovered independently by Miller and Koblitz in mid 80's, has gained widespread acceptance in recent years, taking over a central role in public-key cryptography that was previously exclusive to the classic RSA. This technological shift is partially explained by ECC's reduced key length requirement to achieve...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Generalizations of Network Design Problems With Degree Bounds

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. This paper extends the scope of the iterative relaxation method in two directions: by handling more complex degree constraints in the minimum spanning tree problem namely laminar crossing spanning tree,...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Implementation of Quadratic and Sub-Quadratic Complexity Multipliers using Type II Optimal Normal Bases

    Finite field arithmetic has received a considerable attention in the current cryptographic applications. Many researchers have focused on finite field multiplication due to its importance in various cryptographic operations. Moreover, finite field multiplication can be considered as a cornerstone for elliptic curve cryptosystems. Fan and Hasan introduced a new sub-quadratic...

    Provided By University of Waterloo

  • White Papers // May 2010

    Efficient Techniques for High-Speed Elliptic Curve Cryptography

    In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report new speed records on modern x86-64 based processors. The different implementations include elliptic curves using Jacobian coordinates, extended Twisted Ed-wards coordinates and the...

    Provided By University of Waterloo

  • White Papers // May 2010

    FPGA Implementations of the Hummingbird Cryptographic Algorithm

    Hummingbird is a new ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, the authors describe efficient hardware implementations of a stand-alone Hummingbird component in Field-Programmable Gate Array (FPGA) devices. They implement an encryption only core and an encryption/decryption core...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    On the Capacity and Scheduling of a Multi-Sector Cell With Co-Channel Interference Knowledge

    The authors study the capacity of a single-hop wireless cell comprised of M fixed directional antennas concentrically arranged around a common axis and each reusing the same channel. The premise for this architecture is that co-channel interference between the fixed directional beams can be identified and reported, allowing joint conflict-free...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    DFMAC: DTN-Friendly Medium Access Control for Wireless Local Area Networks Supporting Voice/Data Services

    In this paper, the authors consider a wireless communication network for both local nodes residing in densely populated hotspots and nomadic nodes roaming in a large area. Wireless Local Area Networks (WLANs) are deployed in the hotspots, while a Delay/disruption Tolerant Network (DTN) provides services to nomadic nodes in the...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Design Principles for Robust Opportunistic Communication

    Several researchers have proposed the use of transient communication opportunities, that is, opportunistic communication, to reduce the cost of rural communication. The authors propose some design principles for robust opportunistic communication drawing from the experiences in developing and deploying several practical systems. They conclude with a sketch of some areas...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Throughput-Lifetime Tradeoffs in Multihop Wireless Networks Under an SINR-Based Interference Model

    High throughput and lifetime are both crucial design objectives for a number of multi-hop wireless network applications. As these two objectives are often in conflict with each other, it naturally becomes important to identify the tradeoffs between them. Several works in the literature have focused on improving one or the...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    Spectrum Allocation for Smooth Video Delivery Over Cognitive Radio Networks

    In Cognitive Radio (CR) networks, users are allowed to dynamically access the temporally unused channels to recycle the spectrum for better throughput. However, the dynamic channel availability also results in the highly variable and intermittent download to the users, which directly threats the on-top applications, especially for real-time service such...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting

    Electronic Product Code (EPC) Radio Frequency IDentification (RFID) tags support a cost effective anti-counterfeiting mechanism through the tag-specific and globally unique Transponder ID (TID). However, with the existence of customizable tags, this countermeasure could easily be bypassed as long as the TID codes are leaked through either physically opening genuine...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    Cross-Layer Resource Allocation for Efficient Message Dissemination in Rural Infostation Systems

    In this paper, the authors consider a rural infostation system where power and bandwidth limited infostations is deployed in a large network area with sparsely populated mobile nodes. Direct transmission services are provided to each mobile node, whereas message dissemination services facilitated by relaying are provided to a subgroup of...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    MAC-Layer Active Dropping for Real-Time Video Streaming in IEEE 802.16 Networks

    This paper introduces a MAC-layer Active Dropping (AD) scheme for achieving effective resource utilization and maintaining application-level quality of services in real-time video streaming over the emerging wireless broadband access networks based on Time-Division Multiple Access (TDMA). By proactively dropping the MAC-layer Protocol Data Units (MPDUs) of a video frames...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    iMark: An Identity Management Framework for Network Virtualization Environment

    Network virtualization has gained a lot of popularity in the recent years. It has been heralded as a flexible and open ended network for the future. Network Virtualizations allow the existence of multiple Virtual Networks (VNs). These VNs in turn can assume their own individual routing, addressing, naming and transport...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

    Embedding of Virtual Network (VN) requests on top of a shared physical network poses an intriguing combination of theoretical and practical challenges. Two major problems with the state-of-the-art VN embedding algorithms are their indifference to the underlying substrate topology and their lack of re-optimization mechanisms for already embedded VN requests....

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices

    Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryptographic primitives for many security applications. Motivated by the design of the well-known Enigma machine, the authors present a novel...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Recommendations for Optical Disc Archival Storage

    For a multitude of reasons, printing to paper is still the best option for long term preservation of archival records. However, this is not possible for all records. Audiovisual recordings obviously need to remain in a machine-readable format that can be played using current technology. Many users of digital cameras...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Does Compressed Sensing Improve the Throughput of Wireless Sensor Networks?

    Although Compressed Sensing (CS) has been envisioned as a useful technique to improve the performance of Wireless Sensor Networks (WSNs), it is still not very clear how exactly it will be applied and how big the improvements will be. In this paper, the authors propose two different ways (plain-CS and...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control and Rate Adaptation

    The authors present a number of significant engineering insights on what makes a good configuration for medium-to large-size WMNs when the objective function is to maximize the minimum throughput among all flows. For this, they first develop efficient and exact computational tools using column generation with greedy pricing that allow...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Fast Discrete Fourier Spectra Attacks on Stream Ciphers

    In this paper, the authors present some new results on the selective discrete Fourier spectra attack, introduced first as the recent Ronjom-Helleseth attack and the modifications due to Gong et al. The focal point of this paper is to fill some gaps in the theory of analysis in terms of...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    MAC Performance Analysis for Vehicle-to-Infrastructure Communication

    The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e.g., WLAN), the performance of DCF in the highly mobile vehicular environment is still unclear. On addressing this issue, the authors propose...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Automatic Tuning of the Multiprogramming Level in Sybase SQL Anywhere

    This paper looks at the problem of automatically tuning the database server multiprogramming level to improve database server performance under varying workloads. The authors describe two tuning algorithms that were considered and how they performed under different workloads. They then present the hybrid approach that they have successfully implemented in...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Notio - A Java API for Developing CG Tools

    Notio is a Java API for constructing conceptual graph tools and systems. Rather than attempting to provide a comprehensive toolset, Notio attempts to address the widely varying needs of the CG community by providing a platform for the development of tools and applications. It is, first and foremost, an API...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    Using Sphinx to Improve Onion Routing Circuit Construction

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. The authors significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing,...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    An Interpreter for Framework-Specific Modeling Languages

    Framework-Specific Modeling Languages (FSMLs) are specifications of framework concepts and their intended usages. Interpreting an FSML over a set of applications enables a user to detect framework concepts in source code through reverse-engineering. The authors describe their FSML interpreter written using Prolog. The interpreter itself consists of two main components:...

    Provided By University of Waterloo

  • White Papers // Nov 2009

    Mechanism Design for Network Virtualization

    Recently network virtualization has been proposed as a promising approach to thwart the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared infrastructure which itself is controlled by self-interested infrastructure providers. A major challenge in this respect is the VN embedding problem...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel

    In this paper, the authors consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. First they assumed that the channels are degraded and the wire-tapper...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Case Study of Scientific Data Processing on a Cloud Using Hadoop

    With the increasing popularity of cloud computing, Hadoop has become a widely used open source cloud computing framework for large scale data processing. However, few efforts have been made to demonstrate the applicability of Hadoop to various real-world application scenarios in fields other than server side computations such as web...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures

    An error decodable secret-sharing scheme is a secret-sharing scheme with the additional property that the secret can be recovered from the set of all shares, even after a coalition of participants corrupts the shares they possess. In this paper the authors consider schemes that can tolerate corruption by sets of...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Bluetooth-Enabled In-Home Patient Monitoring System: Early Detection of Alzheimer's Disease

    As the baby boom generation is aging, more and more people are diagnosed with Alzheimer's disease, early detection of which is shown to be vital and necessary for better medical treatments and prolonging life expectancies. This paper proposes a Bluetooth-enabled in-home patient monitoring system, facilitating early detection of Alzheimer's disease....

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Optimizing Energy and Modulation Selection in Multi-Resolution Modulation for Wireless Video Broadcast/Multicast

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Bayesian Decision Aggregation in Collaborative Intrusion Detection Networks

    Cooperation between Intrusion Detection Systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A critical component of a collaborative network is the mechanism of feedback aggregation in which each IDS makes an overall security evaluation based on peers...

    Provided By University of Waterloo

  • White Papers // Jul 2009

    Hardware Implementation of the Compression Function for Selected SHA-3 Candidates

    Hardware implementation of the main building block (compression function) for five different SHA-3 candidates is presented. The five candidates, namely Blue Midnight Wish, Luffa, Skein, Shabal and Blake have been considered since they present faster software implementation results compared to the rest of the SHA-3 proposals. The compression functions realized...

    Provided By University of Waterloo

  • White Papers // Jul 2009

    Corporate Financial Strategy in SMEs

    Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, Small and...

    Provided By University of Waterloo

  • White Papers // Mar 2009

    Hardware Implementations of Multi-output Welch-Gong Ciphers

    The WG family of ciphers provides keystreams with mathematically proven randomness properties such as ideal two-level autocorrelation, balance, long period, ideal tuple distribution, and high and exact linear complexity. In this paper, the authors extend the mathematical analysis of WG family of ciphers to Multi-Output WG (MOWG) ciphers and demonstrate...

    Provided By University of Waterloo

  • White Papers // Feb 2009

    Improving Tor using a TCP-over-DTLS Tunnel

    The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. All traffic between any pair of routers, even if they represent circuits for different clients, is multiplexed over a single TCP connection. This results in interference across circuits during congestion...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Efficient Algorithms to Solve a Class of Resource Allocation Problems in Large Wireless Networks

    The authors focus on efficient algorithms for resource allocation problems in large wireless networks. They first investigate the link scheduling problem and identify the properties that make it possible to compute solutions efficiently. They, then show that the node on-off scheduling problem shares these features and is amenable to the...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Throughput-Lifetime Tradeoffs in Multihop Wireless Networks Under a Realistic Interference Model

    Throughput and lifetime are both crucial design objectives for multi-hop wireless networks. In general, it is not sufficient to optimize either of them separately. As these two objectives are often conflicting with each other, the authors can only hope to identify the tradeoffs between them. This entails a harder problem...

    Provided By University of Waterloo

  • White Papers // Sep 2011

    Characterizing Task Usage Shapes in Google~s Compute Clusters

    The increase in scale and complexity of large compute clusters motivates a need for representative workload bench-marks to evaluate the performance impact of system changes, so as to assist in designing better scheduling algorithms and in carrying out management activities. To achieve this goal, it is necessary to construct workload...

    Provided By University of Waterloo

  • White Papers // Nov 2011

    Network Cooperation for Energy Saving in Green Radio Communications

    Financial and environmental considerations have motivated a trend in wireless communication network design and operation to minimize the amount of energy consumption. Such a trend is referred to as green radio communications. In this paper, network cooperation is investigated as a means of energy saving. Networks with overlapped coverage can...

    Provided By University of Waterloo

  • White Papers // May 2011

    Throughput Optimization in Multi-Hop Wireless Networks With Random Access

    This paper investigates cross-layer design in multi-hop wireless networks with random access. Due to the complexity of the problem, the authors study cross-layer design with a simple slotted ALOHA Medium Access Control (MAC) protocol without considering any network dynamics. Firstly, they study the optimal joint configuration of routing and MAC...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Case Study of Scientific Data Processing on a Cloud Using Hadoop

    With the increasing popularity of cloud computing, Hadoop has become a widely used open source cloud computing framework for large scale data processing. However, few efforts have been made to demonstrate the applicability of Hadoop to various real-world application scenarios in fields other than server side computations such as web...

    Provided By University of Waterloo

  • White Papers // Oct 2010

    Improving the Dominating-Set Routing Over Delay-Tolerant Mobile Ad-Hoc Networks Via Estimating Node Intermeeting Times

    With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In the authors' previous research, they presented a supernode system architecture that employs the Delay-Tolerant Network (DTN) concept to provide seamless communications for roaming users over interconnected heterogeneous wireless...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    DFMAC: DTN-Friendly Medium Access Control for Wireless Local Area Networks Supporting Voice/Data Services

    In this paper, the authors consider a wireless communication network for both local nodes residing in densely populated hotspots and nomadic nodes roaming in a large area. Wireless Local Area Networks (WLANs) are deployed in the hotspots, while a Delay/disruption Tolerant Network (DTN) provides services to nomadic nodes in the...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks

    Recent advances in micro electro mechanical systems and wireless communication have paved the way for the rapid deployment of wireless sensor networks, which have been well recognized as a ubiquitous and general approach for some emerging applications such as real-time traffic monitoring, ecosystem and battlefield surveillance. Typically, a wireless sensor...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

    In this paper, the authors investigate on-demand data services for high-speed trains via a cellular/infostation integrated network. Service requests and acknowledgements are sent through the cellular network to a content server, while data delivery is achieved via trackside infostations. The optimal resource allocation problem is formulated by taking account of...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks

    Wireless networks formed by radio nodes is a subject of much topical interest, and they are found in various applications such as ad hoc networks, mesh networks, sensor networks, etc. For the optimal design and operation of such networks, it is of fundamental importance to determine the information-theoretic capacity of...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    This paper introduces a novel multi-copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Network-Wide Local Unambiguous Failure Localization (NWL-UFL) Via Monitoring Trails

    Monitoring trail (m-trail) has been proposed as an effective approach for link failure localization in all-optical WDM (Wavelength Division Multiplexing) mesh networks. Previous studies in failure localization rely on alarm dissemination via control plane signaling such that the network controller can collect the flooded alarms to form an alarm code...

    Provided By University of Waterloo

  • White Papers // Feb 2011

    D-MG Tradeoff of DF and AF Relaying Protocols Over Asynchronous PAM Cooperative Networks

    The diversity multiplexing tradeoff of a general two-hop asynchronous cooperative network is examined for various relaying protocols such as Non-orthogonal Selection Decode-and-Forward (NSDF), Orthogonal Selection Decode-and-Forward (OSDF), Non-orthogonal Amplify-and-Forward (NAF), and Orthogonal Amplify-and-Forward (OAF). The transmitter nodes are assumed to send Pulse Amplitude Modulation (PAM) signals asynchronously, in which information...

    Provided By University of Waterloo

  • White Papers // Nov 2009

    Mechanism Design for Network Virtualization

    Recently network virtualization has been proposed as a promising approach to thwart the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared infrastructure which itself is controlled by self-interested infrastructure providers. A major challenge in this respect is the VN embedding problem...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Optimal Speedup on a Low-Degree Multi-Core Parallel Architecture (LoPRAM)

    Modern microprocessor architectures have gradually incorporated support for parallelism. In the past the degree of parallelism was rather small and as such it could be best modeled as a constant speedup over the traditional RAM model, however, as a consequence of continued growth this assumption might no longer hold. For...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Intermodeling, Queries, and Kleisli Categories

    Specification and maintenance of relationships between models are vital for MDE. The authors show that a wide class of such relationships can be specified in a compact and precise manner, if inter-model mappings are allowed to link derived model elements computed by corresponding queries. Composition of such mappings is not...

    Provided By University of Waterloo

  • White Papers // Aug 2011

    Specifying Overlaps of Heterogeneous Models for Global Consistency Checking

    Software development often involves a set of models defined in different metamodels, each model capturing a specific view of the system. The authors call this set a multimodel, and its elements partial or local models. Since partial models overlap, they may be consistent or inconsistent wrt. a set of global...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Combining Multiple Dimensions of Knowledge in API Migration

    The authors combine multiple dimensions of knowledge about APIs so that they can support API migration by wrapping or transformation in new ways. That is, they assess wrapper-based API re-implementations and provide guidance for migrating API methods. They demonstrate their approach with two major GUI APIs for the Java platform...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Generating Range Fixes for Software Configuration

    To prevent configuration errors, highly configurable software often allows defining constraints over the available options. As these constraints can be complex, fixing a configuration that violates one or more constraints can be challenging. Although several fix-generation approaches exist, their applicability is limited because they typically generate only one fix, failing...

    Provided By University of Waterloo

  • White Papers // Sep 2011

    Model Synchronization, Mappings, Tile Algebra, and Categories

    The paper presents a novel algebraic framework for specification and design of model synchronization tools. The basic premise is that synchronization procedures, and hence algebraic operations modeling them, are diagrammatic: they take a configuration (diagram) of models and mappings as their input and produce a diagram as the output. Many...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Feature and Class Models in Clafer: Mixed, Specialized, and Coupled

    The authors present Clafer, a class modeling language with first-class support for feature modeling. They designed Clafer as a concise notation for class models, feature models, mixtures of class and feature models (such as components with options), and models that couple feature models and class models via constraints (such as...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Optimally Robust Private Information Retrieval

    The authors give a protocol for multi-server information-theoretic private information retrieval which achieves the theoretical limit for Byzantine robustness. That is, the protocol can allow a client to successfully complete queries and identify server misbehavior in the presence of the maximum possible number of malicious servers. They have implemented their...

    Provided By University of Waterloo

  • White Papers // Aug 2011

    Privacy: Gone With the Typing! Identifying Web Users by Their Typing Patterns

    The lack of privacy protection for Internet users has been identified as a major problem in modern web browsers. Despite potentially high risk of identification by typing patterns, this topic has received little attention in both the research and general community. In this paper, the authors present a simple but...

    Provided By University of Waterloo

  • White Papers // Dec 2010

    A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks

    In this paper, the authors present a trust-based framework for message propagation and evaluation in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whether the information can be trusted. More specifically, their trust-based message propagation model collects and propagates peers' opinions...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Collaborative Intrusion Detection Networks and Insider Attacks

    Cyber intrusion is becoming an increasingly global and urgent problem. Intrusion Detection Systems (IDSs) are deployed to identify intrusions and mitigate their damage. A stand alone IDS does not have complete information or knowledge to detect intrusions. A Collaborative Intrusion Detection Network (CIDN) consists in a set of cooperating IDSs...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    CommitCoin: Carbon Dating Commitments With Bitcoin

    In the standard definition of a commitment scheme, the sender commits to a message and immediately sends the commitment to the recipient interested in it. However, the sender may not always know at the time of commitment who will become interested in verifying it. Further, when the interested party does...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Extended Combinatorial Constructions for Peer-to-Peer User-Private Information Retrieval

    The authors consider User-Private Information Retrieval (UPIR), an interesting alternative to Private Information Retrieval (PIR) introduced by Domingo-Ferrer et al.. In UPIR, the database knows which records have been retrieved, but does not know the identity of the person making the query. The goal of UPIR, then, is to disguise...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and stored in encrypted form. Major challenges exist concerning the aspects of the generation, distribution, and usage of encryption keys in cloud systems,...

    Provided By University of Waterloo

  • White Papers // Feb 2012

    Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2

    This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with simple key schedules and having block sizes smaller than key lengths. The authors have successfully applied this multidimensional approach to the...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Resource and Service Discovery in Large-Scale Multi-Domain Networks

    With the increasing need for networked applications and distributed resource sharing, there is a strong incentive for an open large-scale service infrastructure operating over multi-domain and multi-technology networks. Service discovery, as an essential support function of such an infrastructure, is a crucial current research challenge. Although a few survey papers...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    An Interpreter for Framework-Specific Modeling Languages

    Framework-Specific Modeling Languages (FSMLs) are specifications of framework concepts and their intended usages. Interpreting an FSML over a set of applications enables a user to detect framework concepts in source code through reverse-engineering. The authors describe their FSML interpreter written using Prolog. The interpreter itself consists of two main components:...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Automatic Tuning of the Multiprogramming Level in Sybase SQL Anywhere

    This paper looks at the problem of automatically tuning the database server multiprogramming level to improve database server performance under varying workloads. The authors describe two tuning algorithms that were considered and how they performed under different workloads. They then present the hybrid approach that they have successfully implemented in...

    Provided By University of Waterloo

  • White Papers // Aug 2011

    SMURFEN: A System Framework for Rule Sharing Collaborative Intrusion Detection

    Intrusion Detection Systems (IDSs) are designed to monitor network traffic and computer activities in order to alert users about suspicious intrusions. Collaboration among IDSs allows users to benefit from the collective knowledge and information from their collaborators and achieve more accurate intrusion detection. However, most existing collaborative intrusion detection networks...

    Provided By University of Waterloo

  • White Papers // Sep 2010

    Effective Acquaintance Management for Collaborative Intrusion Detection Networks

    An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions about intrusions, to enhance the overall accuracy of intrusion assessment as well as the ability of detecting new classes of intrusions. Towards this goal, the authors propose a distributed...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Bayesian Decision Aggregation in Collaborative Intrusion Detection Networks

    Cooperation between Intrusion Detection Systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A critical component of a collaborative network is the mechanism of feedback aggregation in which each IDS makes an overall security evaluation based on peers...

    Provided By University of Waterloo

  • White Papers // Jul 2011

    From State-To Delta-Based Bidirectional Model Transformations: The Symmetric Case

    A bidirectional transformation (BX) keeps a pair of interrelated models synchronized. Symmetric BXs are those for which neither model in the pair fully determines the other. The authors build two algebraic frameworks for symmetric BXs, with one correctly implementing the other, and both being delta-based generalizations of known state-based frameworks....

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Inferring Meta-Models for Runtime System Data From the Clients of Management APIs

    A new trend in run-time system monitoring is to utilize MOF- based techniques in analyzing the run-time system data. Approaches and tools have been proposed to automatically reflect the system data as MOF compliant models, but they all require users to manually build the meta-models that define the types and...

    Provided By University of Waterloo