Ändra sökning
Avgränsa sökresultatet
1 - 4 av 4
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Alam, Quratulain
    et al.
    Department of Computer Sciences, Institute of Management Sciences, Peshawar.
    Tabbasum, Saher
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Malik, Saif U.R.
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Alam, Masoom
    Department of Computer Sciences, COMSATS Institute of Information Technology, Islamabad.
    Ali, Tamleek
    Department of Computer Sciences, Institute of Management Sciences, Peshawar.
    Akhunzada, Adnan
    Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur.
    Khan, Samee U.
    Department of electrical and computer engineering, North Dakota State University, Fargo, ND.
    Vasilakos, Athanasios V.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Buyya, Rajkumar
    Cloud Computing and Distributed Systems, (CLOUDS) Laboratory, Department of Computing and Information Systems, The University of Melbourne.
    Formal Verification of the xDAuth Protocol2016Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 11, nr 9, s. 1956-1969Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.

  • 2.
    Kim, Dohyung
    et al.
    Sungkyunkwan University, Suwon, South Korea.
    Bi, Jun
    Tsinghua University, Beijing .
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Yeom, Ikjun
    Sungkyunkwan University, Suwon .
    Security of Cached Content in NDN2017Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, nr 12, s. 2933-2944Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In Named-Data Networking (NDN), content is cached in network nodes and served for future requests. This property of NDN allows attackers to inject poisoned content into the network and isolate users from valid content sources. Since a digital signature is embedded in every piece of content in NDN architecture, poisoned content is discarded if routers perform signature verification; however, if every content is verified by every router, it would be overly expensive to do. In our preliminary work, we have suggested a content verification scheme that minimizes unnecessary verification and favors already verified content in the content store, which reduces the verification overhead by as much as 90% without failing to detect every piece of poisoned content. Under this scheme, however, routers are vulnerable to verification attack, in which a large amount of unverified content is accessed to exhaust system resources. In this paper, we carefully look at the possible concerns of our preliminary work, including verification attack, and present a simple but effective solution. The proposed solution mitigates the weakness of our preliminary work and allows this paper to be deployed for real-world applications.

  • 3.
    Luo, Hongmin
    et al.
    School of Computer Science and Engineering, Beihang University, Beijing.
    Chen, Zhe
    Huawei Technologies.
    Li, Jiawei
    School of Electronic and Information Engineering, Beijing Jiaotong University.
    Vasilakos, Athanasios
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers2017Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, nr 8, s. 1801-1805, artikel-id 7888484Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In recent years, there are increasing interests in using path identifiers (PIDs) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch distributed denial-ofservice (DDoS) flooding attacks. To address this issue, in this paper, we present the design, implementation, and evaluation of D-PID, a framework that uses PIDs negotiated between neighboring domains as inter-domain routing objects. In DPID, the PID of an inter-domain path connecting two domains is kept secret and changes dynamically. We describe in detail how neighboring domains negotiate PIDs, how to maintain ongoing communications when PIDs change. We build a 42-node prototype comprised by six domains to verify D-PID’s feasibility and conduct extensive simulations to evaluate its effectiveness and cost. The results from both simulations and experiments show that D-PID can effectively prevent DDoS attacks.

  • 4.
    Revadigar, Girish
    et al.
    School of Computer Science and Engineering, UNSW Australia.
    Javali, Chitra
    School of Computer Science and Engineering, UNSW Australia.
    Xu, Weitao
    School of Information Technology and Electrical Engineering, University of Queensland, Brisbane.
    Vasilakos, Athanasios V.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Hu, Wen
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Jha, Sanjay
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables2017Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, nr 10, s. 2467-2482Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The increased usage of smart wearables in various applications, specifically in health-care, emphasizes the need for secure communication to transmit sensitive health-data. In a practical scenario, where multiple devices are carried by a person, a common secret key is essential for secure group communication. Group key generation and sharing among wearables has received very little attention in the literature due to the underlying challenges: (i) difficulty in obtaining a good source of randomness to generate strong cryptographic keys, and (ii) finding a common feature among all the devices to share the key. In this paper, we present a novel solution to generate and distribute group secret keys by exploiting on-board accelerometer sensor and the unique walking style of the user, i.e., gait. We propose a method to identify the suitable samples of accelerometer data during all routine activities of a subject to generate the keys with high entropy. In our scheme, the smartphone placed on waist employs fuzzy vault, a cryptographic construct, and utilizes the acceleration due to gait, a common characteristic extracted on all wearable devices to share the secret key. We implement our solution on commercially available off-the-shelf smart wearables, measure the system performance, and conduct experiments with multiple subjects. Our results demonstrate that the proposed solution has a bit rate of 750 bps, low system overhead, distributes the key securely and quickly to all legitimate devices, and is suitable for practical applications.

1 - 4 av 4
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf