Science topic
Computer Security and Reliability - Science topic
Explore the latest questions and answers in Computer Security and Reliability, and find Computer Security and Reliability experts.
Questions related to Computer Security and Reliability
In quantum cryptographic protocols, participants typically share both a quantum channel and a classical authenticated channel. Authenticated channels ensure that messages come from legitimate senders and have not been tampered with. However, these channels do not inherently protect against the interception or blocking of messages by an adversary. Blocking or delaying messages in the classical channel is considered an active attack.
Many sources, including the first article in quantum key distribution by Bennett and Brassard, mention that the public channel between participants is only susceptible to passive attacks, not active attacks.
My question is: In quantum cryptographic protocols (such as QKD, QSS, and QPC), can an attacker block or delay messages in the public channel without being detected? If so, wouldn't that compromise the security of many well-established protocols such as the BB84?
Dear Researchers, I perform J48 Algorithm on KDD Test dataset in WEKA. it gives me Anomaly and normal class. if i want to know detail Anomaly attacks by category like Dos, R2L, U2R. how can i do in same dataset?
if someone helps i will be very thankful
This is related to Homomorphic encryption. These three algorithms are used in additive and multiplicative homomorhism. RSA and El gamal is multiplicative and Pallier is additive.Now i want to know what is the time complexity of these algorithms.
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
I am currently working on an application level IDPS (Intrusion Detection and Prevention System) for Cloud Computing which involves machine learning. So i am looking for a huge amount of data. Please let me know if there is a data-set that you know of that i could use in my project. Thanks in advance!
Can anyone please suggest me the Java API if available, and i want to ask that the API available for CP-ABE i.e., DET-ABE, can be used to implement Kp-ABE.?
what are the upcoming challenges for cloud forensics and what are the latest issues related to cloud forensics, and where to find the credentials to solve these issues.
I'm looking for time profile benchmark for asymmetric pairings such as Ate, Optimal-Ate in BN, KSS and BLS curves. There are several implementations of pairing library i.e. PBC, tepla, MIRACL, relic. But I am looking for the pairing implementation which the fastest till date achieved in any environment for the standard parameter.
Parameters suggested before the new exNFS algorithm is proposed by Kim et al in CRYPTO2016.
Image formats like jpeg, gif, tiff, etc do they have any inherent encryption algorithm...like jpeg is itself a compression technique..
Dear!
Please give me information about the performance analysis of he ECC Encryption and Decryption for a given text data.
I am implementing QSS based signal considering 10 no of sensors, 5 frames and every frame consist of 512 QSS signals. after performing processing i get Co-variance matrix R as shown in the attachment of dimension 10by10 and 100by1 after applying Vec function. where Y is the final matrix. after applying SVD on Y it give me 100by100 noise space vector. I want to apply MUSIC but i couldnt able to generate AB(as shown in attachment at the end) of Dim 100by 1081(where 1081 can be generated by range=-90:0.1:90). How i can generate AB using Vec or Khatri Rao based method???
How the symmetric encryption can be taken to the cloud security and big data security?
Are there open data sets available for covert channel experiments? or otherwise are there tools to simulate and capture the data?
Please, any one tell me what are the latest research developments in Privacy preservation in cloud computing?
i need some security cloud Lab to do experiments using XACML framework and an extended XACML framework and doing case study.
What policies can we use to stop one or more Service Providers from assembling users attributes sent to them to process resources for the users and then preventing them harm?
I am aimed to study behaviour of honeypot attack on SSH server. Is there any simulation setup or tool to carry out this experiment?
Consider the scenario, that we have a Lookup table (LUT) which takes the desired value as input and output correspondingly the matched value in LUT. We don't want anyone to look into the LUT; hence it is embedded into an executable file [.exe] ( from matlab standalone application Or Visual Studio executable file etc Or any other API development kit) which can be referred as a black box.
How to prove its security in-terms of an adversary querying this .exe file for input and getting the response. The .exe file will output result if the input exists in LUT and the corresponding entry is matched.
Actually I am not good at defining security proofs or games. As a matter of fact i have searched too much papers regarding this to have an idea but all in vain. Moreover, I even have a doubt whether can I proceed with the concept of encrypting/hiding LUT by making an .exe file from it.
Your sincere comments will be appreciated.
I want to classify data based on their importance, and secure them based on that classification. My question, is there a difference between data importance and their security level. To me, the more important data become , the more security level they need, so the relation between data's importance and their level of security is direct relationship. Is there a way that data could be important but do not need to be secure. In other words, can the relationship between data importance and its security level become separate of each other in the concept of security area. e.g : (very important but insecure). Please note I am talking about the concept, not technically. If the answer yes, Can you please give an example?
Thank you for your cooperation.
Salem,
In a wrapper feature selection algorithm, we use the accuracy rate to evaluate the candidate feature subsets during the search process.
How can we show that a wrapper feature selection algorithm hasn't overfitting.
can we use the final selected features (feature subset) to calculate the accuracy on the training set and the validating set, and then compared the two obtained accuracies. According to how much closer the two accuracies are, we decide about the overfitting.
Thanks.
I want to write a module for fault injection in cloudsim, I want to generate failures according to statistical distribution. My question is how I can make a resource failed? I mean by resources ( CPU, RAM, network, VM, VMM... etc)
I want to do that in order to measure a failure rate and other reliability metrics of each resource.
Thank you in advance,
I need to know about any relevant papers/stuff or and research carried out in the field of cryptography / security on an encrypted non-tamper-able Look up Table. The table can be considered as a black box given input, corresponding to the mapped entries it will return the output. Also, black box is in access of an adversary to make queries of its choice in a security game.
I have searched and worked out on many possible solutions but still all in vain, none of them provides both security and functionality.
In matlab and visual C++ we can built standalone (executable file) given input it will return output with no one knowing about whats embedded in the black box. Any one can query this black box with input without knowing the inside functionality. But I have read on their developer forums that executable files created by them are not secure. Any one can break it, moreover we cant prove the security of these sort of standalone exe's.
I have read papers on predicate / searchable encryption for making up an encrypted look up table and then querying it with token's; but this concept does not work under all conditions and the involved computations are too much.
Any other who came across papers addressing this issue or a generic approach to tackle this if I missed something pertaining to it.
I followed this link :
i can print position x,y in the file like the link but when i added the code for print energy in the file i got the segmentation fault error.
how should i overcome this problem?
with best regards
I'm looking for a big data that is generated from IoT system and analyze it with Hadoop. I tried to find online some IoT sample big data or API that allow me to retrieve IoT data but I could not find any. If you know any, please let me know. So I think the I'm only left with one option which is to simulate an IoT and let it run to create dummy data.
Thank you anyway for your help
What kind of features do i need to consider in windows API calls that can help in detecting the behavior of malware using data mining techniques.
And how can that data be collected.
experimental realization of quantum teleportation technologies has attracted lots of interests from different fields in applied sciences however there exists different physical implementation on these teleportation technologies i.e solid-state, photonic qubits, trapped ions etc with their own mechanisms advantages and disadvantages.
now the question arrises are there any generic frameworks that can be used as the basis for implementing quantum teleportation infrastructures?
one of the greatest attraction on teleportation is the realization of secure communication, improved transmission speed, etc
How will someone go about developing such a generic framework and on what basis?
I am working cloud intrusion detection system. in the beginning i used KDDcup darpa datset, but nowadays when am reading some journal they used CIDD dataset, but i am not getting that dataset anywhere, kindly help me to get the CIDD dataset.
Hello to everyone and thank you for your time,
How should I count complexity on a (soft) real - time steganography algorithm? I need a small comlexity analysis. What should I include? No tables neccessery.
Thank you again in advance
iam working in searching encrypted data in cloud computing and i want to combine attribute based encryption with searchable encryption , i search for java library implementing ciphertext policy attribute based encryption.
Is it still the DES algorithm used in banking/ financial transaction systems (in spite of the weak key issue)? Or whether it is the ECC algorithm that has replaced the DES? I believed that may be ECC is in use but came to know that it is still DES! Can someone, clarify what algos are actually in use and why.
Given a set of twenty-three (23) attributes:
userID, email, common name, surname, givenName, Global username, displayName, Organization Name, Organizational Unit, home organization, institution type, affiliation type, affliationTypeScope, PrimaryAffiliation, Entitlement, PersonAssurance, TargetId, Legalname, sharedToken, AffiliationType, Postal Address, TelephoneNumber, MobileNumber.
How many of these attributes are sufficient enough to identify an individual in cloud environment?
I am wondering weather asymmetric encryption such as Elliptic Curve Cryptography add extra bits to the packets through the transmission. I know it add many bits and might at least 1024 bits to deliver the keys, but what about after that? I mean what about the rest of packets for normal communication after delivering the keys, do they also have to carry extra bits too?
Thanks guys for your participation.
How much power does the encrypted packet consume comparing to unencrypted packet?
I know it depends on the encryption algorithm, but you may mention the type of encryption alongside with the power consumption. What I would like to know is both the power consumed by an unencrypted packet and an encrypted packet. so I can make comparison.
I went through many papers to figure this out, but they just mention the power consumed by encryption without mentioning how much the unencrypted packet consume ?
I need to know weather the encryption add significant overhead to the overall consumption, either symmetric or asymmetric , and might the only way is to compare the power consumed with and without encryption in numbers.
Thank you so much guys for your cooperation in advance.
Is PCA a suitable mechanism for fingerprint recognition?
Is minutiae based mechanism prefered over PCA for fingerprint recognition?
I am working in NS2 and I want to to encryption and decryption in NS2. So how it can be implemented?
symmetric key cipher (block or stream cipher) providing partial decryption of data at some points. Although the entire data is not been decrypted but the data decrypted to that specific point should be viewed or accessed.
The partial decryption keys can be inherited form the main symmetric key to do partial decryptions successfully.
Can anyone refer to me any good stuff or papers worked out in this area?
Is there any good paper or research carried out till now that a data is encrypted by a single key or onwer(user) and their are 2 or more decryption keys. One key can decrypt the entire data. Other keys decrypt partial data or a portion of data. A person having no key cannot decrypt the data but those having keys can fully or partially decrypt data based on the keys. ?
Hello,
I am a research student at the University of Kent, studying usability and performance assessment in Automated Border Control systems. As part of my research, I am hoping to investigate passport interactions and specifically how a user interacts with a passport reader. I am hoping to record the interactions with a program that utilises Microsoft's Kinect for skeletal tracking, analysing how a user positions them self for the presentation.
I am outreaching to institutions that may be able to lend us a passport reader for a period while I collect some data. Ideally, the reader would be able to read RFID chips and would be able to secure the entire document (see http://passportscanner.co.uk/product/brands/suprema-realpass-v/ for example) Please get in touch if you know anyone who can assist.
Many thanks,
Josh Robertson
i want to work in cloud computing as a part of my research work. seeking an advise on the research area in searchable encryption in cloud computing.
Is there any scope of research in this field?
if possible, please point me to any published research papers on the subject
I have new authentication method asked user to login based in some features,
how can I calculate the FP and FN .and is there any tool can help.
Dear all,
I proposed a framework security, but i want to determine exactly which is the best model for assessment this framework
I am trying to implement the video watermarking based on visual cryptography. I have created two share of a image in '.bmp' formats. How these two shares will be embedding in the video while using the frequency domain.
I have divided the video into parts ( Suppose the video consisting 300 frames. In this way each part is having 150 frames each) to embed these share in two different parts. I have extracted the Y component of each part of the video. On which I had applied the DWT. Extract the HH Band. Apply SVD. And get the singular matrix.
How could I process the two share of transparencies in order to embed into the singular value obtained of these two parts of video as indicated above. Also requested to please tell me the extraction process of these two transparencies from watermarked video ?
You are most welcomed to informed me about any other method to implement the visual cryptography based video watermarking.
I want to know how to prevent a peer from changing its identity from time to time?
Can anyone tell me what SAN parameters is important to characterise the performance?
I am looking for a tool to simulate the authentication in MCC environment.
I just need to know how to test the security level of communication channels during the session in the mobile cloud environment.
For example there is linked chain of hashes of a document. some of consecutive hashes are deleted how to recover or reconstruct the chain.
I am interested to know how the cloud providers trust their new cloud users and what are the factors they considered for trusting the new user.
I am interest to find some techniques to protect privacy for sensitive data which is to be published in social media for example.
Since confused deputy problem is a type of privilege escalation, and least privilege principle only gives program the necessary privilege, could the problem be solved?
If yes, how is least privilege used to solve it; if no, why least privilege cannot solve the problem?
Thanks for your answer in advance.
(TEMPEST )
countermeasures against electromagnetic compatibility (EMC) problems
This is to understand the possible solutions for autonomic computing algorithm in Maths. At the moment , according to my own experiences , binomial heap really great in this approach compared to others. Bayesian Network , linear regression , N-Gram requires extra parameters in solving false and right alarms. Any suggestion how the algorithm can really inline with K-MAPE will be really grateful. Thanks in advanced.
I want to know the issues around distributed system security and how can be remoduled to give proposed possible things to overcome?
I want to know some latest issues in terms of privacy due to data publishing or data mining in real example that happened after 2013. I have some example like
Google bypass safari browser privacy bypass issue
Max Schrems against Facebook.
Please share if you know some more example
I know WEKA or TEDRAD are softwares that are used for association rules mining in Bayesian networks. But I don't know which one is better and if there is better software to do this work?
What is the Mechanism of Digital signature in mobile banking? Is it be possible on a sim card of a customer with exchange of keys?
Either it is symmetric or asymetric.
Conference Paper A logic-route key tree based group key management scheme for...
I have a terabyte of pcap files. I would like to find intrusions in those files. How can I eliminate/reduce unwanted fields or packets in those pcap files ?
I have two pcap files, one for background traffic (non-malicious) and second for attack traffic. To make the traffic more realistic, I want to mix up both packet captures and send them using tcpreplay machine to (another) IDS machine for IDS evaluation. I think there is two options to achieve this:
1. to merge these two files into one file, but here I think time-stamp issue arise.
2. to open two tcpreplay command prompts on tcpreplay machine, one for background file and other one for attack file, and both sending from same interface.
Which one is more accepted in research community?
What tools are there currently for securing big data? Kindly suggest if you know any. I am currently researching into tools that can be used to secure both non structured and structured big data. Am looking for possible suggestions and peoples ideas on the different tools. Am currently aware of the Vormetric tool for protecting data at rest, but I need to understand what technology is used to achieve that and how it can be improved further? Plus am not just concerned about only data at rest, but also interested in data of different states.
Hi, can someone please share a link about the type of hardware and software vulnerabilities that leads to an attack please?
With relation to my research work, I would like to know the recent work going on in TCP SYN flood attack.
I want to know the time complexity and computation complexity involved in various cryptography algorithms used for encryption and decryption. Can anybody provide me a good link or suggest me a good text or IEEE Paper for the same?
Is there a list of attributes or checkpoints to evaluate?
IBE was first introduced by Adi Shamir on 1984 to provide easier method of public key encryption. Ever since, it has always been an area of research. What are its vulnerabilities? What are the design problems of establishing such a system? Why has it been an open problem for the last 30 years?
I am trying to find a trusted tool for evaluating the performance of cryptographic algorithms which is linux compatible. I tried CIAT but found some compatibility issues. The coding of a tool for NiST specification is too hard and time consuming so can anyone suggest any tools. Thanks in advance.
From Gilbert/Lynch proof of CAP, I did not find the difference between local area and wide area networks for applying CAP. Someone said that transient network problems in wide area setting would be common, but can be eliminated by proper failure detectors in one single data center. However, as I know, failure detectors always need time to discover failures and may has a probability of false suspicion, therefore transient failures in local area networks can only be reduced with failure detectors but always exist. Does anyone know about this?
Memory randomization is a way to protect memory from security attacks, and also a way to avoid false sharing on cache lines. But the common way to change the layout is by adding padding at the expense of losing benefits from cache locality. Do other ways to do memory randomization while still being able to utilize the cache localities exist?
I have heard that it has been proven (theoretically or practically)?
In non-linear combination stream cipher.
In IP-based WSN surveys, they recomand that IPsec must change IKE by another leightweight KMS, and also IEEE 802.15.4 MAC must have a KMS for its AES algorithm.
Can we use the same KMS for both of IPsec and IEEE 802.15.4 MAC? how?
thank you