ORCID Profile
0000-0001-8453-2378
Current Organisations
National Research and Innovation Agency
,
University Medical Center of the Johannes Gutenberg University Mainz
,
Commonwealth Scientific and Industrial Research Organisation
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Data Security | Data Format | Data Encryption | Analysis Of Algorithms And Complexity | Detection And Prevention Of Crime; Security Services | Computation Theory And Mathematics Not Elsewhere Classified | Other Artificial Intelligence | Computation Theory and Mathematics | Computer Communications Networks | Information Systems | Computer System Security | Data Encryption | Text Processing | Communications Technologies | Information Systems Management | Criminology | Interdisciplinary Engineering Not Elsewhere Classified | Research, Science And Technology Policy | Interdisciplinary Engineering | Law Not Elsewhere Classified | Coding And Information Theory | Global Information Systems
Information processing services | Telecommunications | Application packages | Application tools and system utilities | Computer software and services not elsewhere classified | Technological and organisational innovation | Computer Software and Services not elsewhere classified | Other | Communication services not elsewhere classified |
Publisher: Wiley
Date: 20-05-2015
DOI: 10.1002/CPE.3497
Publisher: Springer Berlin Heidelberg
Date: 1990
DOI: 10.1007/BFB0030365
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: Springer-Verlag
Date: 1990
DOI: 10.1007/BFB0030364
Publisher: Springer Berlin Heidelberg
Date: 2015
Publisher: Springer Science and Business Media LLC
Date: 07-06-2023
Publisher: Springer Science and Business Media LLC
Date: 24-11-2013
Publisher: Institution of Engineering and Technology (IET)
Date: 2008
Publisher: Springer Berlin Heidelberg
Date: 1991
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IOP Publishing
Date: 10-2018
Publisher: Springer Berlin Heidelberg
Date: 2000
DOI: 10.1007/10719994_14
Publisher: arXiv
Date: 2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: ACM Press
Date: 1994
Publisher: Elsevier BV
Date: 04-2008
Publisher: IEEE
Date: 12-2014
Publisher: Psychology Press
Date: 15-02-2013
Publisher: Wiley
Date: 08-11-2012
DOI: 10.1002/SEC.646
Publisher: Walter de Gruyter GmbH
Date: 23-07-2014
Abstract: We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any t n 2 $t & \\frac{n}{2}$ inputs) and has subexponential complexity of construction based on coloring of planar graphs. More specifically, following the result of Desmedt et al. (2012) that the problem of MPC over non-Abelian groups can be reduced to finding a t -reliable n -coloring of planar graphs, we show the construction of such a graph which allows a path from the input nodes to the output nodes when any t -party subset is in the possession of the adversary. Unlike the deterministic constructions from Desmedt et al. (2012) our construction has subexponential complexity and is optimal at the same time, i.e., it is secure for any t n 2 $t & \\frac{n}{2}$ .
Publisher: Walter de Gruyter GmbH
Date: 12-2012
Abstract: Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability , are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterex les.
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/CTC.2010.10
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/CTC.2010.13
Publisher: Springer Berlin Heidelberg
Date: 1995
Publisher: Springer Science and Business Media LLC
Date: 28-07-2012
Publisher: Elsevier BV
Date: 2022
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer Berlin Heidelberg
Date: 1991
Publisher: Institution of Engineering and Technology (IET)
Date: 2000
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Emerald
Date: 05-10-2012
DOI: 10.1108/13685201211266015
Abstract: Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the approaches to build a Cyber Attacker Model Profile (CAMP) that can be used to characterise and predict cyber attacks. The paper builds a model using social and economic independent or predictive variables from several eastern European countries and benchmarks indicators of cybercrime within the Australian financial services system. The paper found a very strong link between perceived corruption and GDP in two distinct groups of countries – corruption in Russia was closely linked to the GDP of Belarus, Moldova and Russia, while corruption in Lithuania was linked to GDP in Estonia, Latvia, Lithuania and Ukraine. At the same time corruption in Russia and Ukraine were also closely linked. These results support previous research that indicates a strong link between been legitimate economy and the black economy in many countries of Eastern Europe and the Baltic states. The results of the regression analysis suggest that a highly skilled workforce which is mobile and working in an environment of high perceived corruption in the target countries is related to increases in cybercrime even within Australia. It is important to note that the data used for the dependent and independent variables were gathered over a seven year time period, which included large economic shocks such as the global financial crisis. This is the first paper to use a modelling approach to directly show the relationship between various social, economic and demographic factors in the Baltic states and Eastern Europe, and the level of card skimming and card not present fraud in Australia.
Publisher: Springer International Publishing
Date: 2013
Publisher: American Physical Society (APS)
Date: 02-11-2022
Publisher: IEEE
Date: 12-2008
Publisher: Elsevier BV
Date: 05-2000
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: National Institute of Telecommunications
Date: 31-03-2022
Publisher: Institution of Engineering and Technology (IET)
Date: 03-2017
Publisher: IEEE
Date: 12-2008
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11922841_23
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Walter de Gruyter GmbH
Date: 15-05-2019
Abstract: Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS& E) method allows to perform encryption and signing in parallel. Parallel execution of cryptographic algorithms decreases the computation time needed to signcrypt messages. CtS& E uses weaker cryptographic primitives in a generic way to achieve a strong security notion of signcryption. Various message pre-processing schemes, also known as message padding, have been used in signcryption as a commitment scheme in CtS& E. Due to its elegance and versatility, the sponge structure turns out to be a useful tool for designing new padding schemes such as SpAEP [T. K. Bansal, D. Chang and S. K. Sanadhya, Sponge based CCA2 secure asymmetric encryption for arbitrary length message, Information Security and Privacy – ACISP 2015, Lecture Notes in Comput. Sci. 9144, Springer, Berlin 2015, 93–106], while offering further avenues for optimization and parallelism in the context of signcryption. In this work, we design a generic and efficient signcryption scheme featuring parallel encryption and signature on top of a sponge-based message-padding underlying structure. Unlike other existing schemes, the proposed scheme also supports arbitrarily long messages. We prove the construction secure when instantiated from weakly secure asymmetric primitives such as a trapdoor one-way encryption and a universal unforgeable signature. With a careful analysis and simple tweaks, we demonstrate how different combinations of weakly secure probabilistic and deterministic encryption and signature schemes can be used to construct a strongly secure signcryption scheme, further broadening the choices of underlying primitives to cover essentially any combination thereof. To the best of our knowledge, this is the first signcryption scheme based on the sponge structure that also offers strong security using weakly secure underlying asymmetric primitives, even deterministic ones, along with the ability to handle long messages, efficiently.
Publisher: Emerald
Date: 11-11-2014
DOI: 10.1108/JPBM-04-2014-0557
Abstract: – The purpose of this research is to analyze brand competition in China using the Duplication of Purchase (DoP) law, with important implications for understanding Chinese buyer behavior in comparison with Western buyers. Discovered in the Western markets, the DoP law holds across a variety of product categories. – Multiple sets of new data are examined to extend past research in the application of the DoP law in Chinese buying behavior. This study draws on panel data and self-reported data, utilizing bootstrapping to identify partitions where excess sharing occurs. – This paper finds the DoP law holds across six categories (two personal care, two impulse categories and two durables), as well as over multiple years. Brands in China share customers with other brands in line with the market share of the competitor brand. There were few partitions where brands shared significantly more customers than expected. Partitions occur due to the same umbrella brand or ownership, and geographic location. – Areas for further research include extended replication in other categories, investigating partitions and whether a different consumer path to purchase occurs in China. – DoP can be applied across a wide range of categories in China to understand market structure. New entrants to China can use this approach to understand a category from a consumer behavior perceptive. DoP provides guidelines for marketers to identify competition and allocate resources appropriately. – This research provides a comprehensive, unparalleled examination across six very different categories of brand competition in China. This gives confidence in the robustness and generalizability of the results.
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: arXiv
Date: 2020
Publisher: Springer Science and Business Media LLC
Date: 31-03-2020
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Institution of Engineering and Technology (IET)
Date: 1989
Publisher: Elsevier BV
Date: 09-2017
Publisher: Springer Science and Business Media LLC
Date: 13-07-2022
DOI: 10.1007/S10207-022-00597-4
Abstract: The bulk of Internet interactions is highly redundant and also security sensitive. To reduce communication bandwidth and provide a desired level of security, a data stream is first compressed to squeeze out redundant bits and then encrypted using authenticated encryption. This generic solution is very flexible and works well for any pair of (compression, encryption) algorithms. Its downside, however, is the fact that the two algorithms are designed independently. One would expect that designing a single algorithm that compresses and encrypts (called compcrypt) should produce benefits in terms of efficiency and security. The work investigates how to design a compcrypt algorithm using the ANS entropy coding. First, we examine basic properties of ANS and show that a plain ANS with a hidden encoding table can be broken by statistical attacks. Next, we study ANS behavior when its states are chosen at random. Our compcrypt algorithm is built using ANS with randomized state jumps and a sponge MonkeyDuplex encryption. Its security and efficiency are discussed. The design provides 128-bit security for both confidentiality and integrity/authentication. Our implementation experiments show that our compcrypt algorithm processes symbols with a rate up to 269 MB/s (with a slight loss of compression rate) 178 MB/s.
Publisher: Elsevier BV
Date: 09-1985
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Science and Business Media LLC
Date: 10-12-2013
Publisher: Springer Berlin Heidelberg
Date: 1991
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: arXiv
Date: 2020
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer Berlin Heidelberg
Date: 2000
DOI: 10.1007/10718964_27
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: Springer Science and Business Media LLC
Date: 18-05-2018
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Inderscience Publishers
Date: 2009
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer Berlin Heidelberg
Date: 1991
Publisher: Walter de Gruyter GmbH
Date: 12-2013
Abstract: Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Publisher: Elsevier BV
Date: 10-2015
Publisher: Elsevier BV
Date: 11-2021
Publisher: Springer Berlin Heidelberg
Date: 1998
DOI: 10.1007/BFB0053731
Publisher: Springer Berlin Heidelberg
Date: 2015
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11927587_8
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: SPIE
Date: 28-05-2014
DOI: 10.1117/12.2052886
Publisher: Elsevier BV
Date: 06-2018
Publisher: IEEE
Date: 1999
Publisher: Springer Science and Business Media LLC
Date: 21-05-2021
DOI: 10.1186/S13638-021-01968-6
Abstract: In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. This should result in improved safety and may optimize traffic. However, VC systems are vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. We demonstrate the application of our framework using two different types of case study: in idual analysis and hypothetical design. Additionally, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography and key management in VC systems. We also review the threats, authentication, and privacy requirements in vehicular networks.
Publisher: Springer Science and Business Media LLC
Date: 26-06-2023
Publisher: Institution of Engineering and Technology (IET)
Date: 09-2019
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: Springer Berlin Heidelberg
Date: 1990
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Singapore
Date: 2016
Publisher: Association for Research in Vision and Ophthalmology (ARVO)
Date: 02-12-2011
DOI: 10.1167/IOVS.11-7879
Abstract: Neuronal and glial alterations precede the overt vascular change that characterizes diabetic retinopathy. Because retinal astrocytes modulate neuronal and vascular function, this study investigated the time course of astrocyte, Müller cell, and neuronal change during diabetes to determine whether astrocytes may play an early role in diabetic retinopathy. Sprague-Dawley rats were rendered diabetic via streptozotocin and neuronal and glial changes were assessed after 2-10 weeks. Astrocyte change was investigated using connexin-26 immunolabeling, whereas connexin-26 and -43 gene expressions were quantified using real-time PCR. Hypoxia was measured by pimonidazole labeling and the expression of hypoxia-inducible factor-1 alpha (HIF-1α) was quantified using Western blot. Müller cell gliosis was assessed by glial fibrillary acidic protein immunolabeling and retinal function assessed using the electroretinogram. Astrocyte connexin-26 and -43 gene and protein expression decreased after 4 weeks of diabetes, before significant astrocyte loss. At the same time, the retina became hypoxic, with increased HIF-1α expression and pimonidazole labeling in the ganglion cell layer. This coincided with a decrease in ganglion cell function. After 6 weeks of diabetes, Müller cell gliosis became more evident and there were additional functional deficits in photoreceptoral and amacrine cell responses. These findings suggest that early changes in astrocytes are coincident with inner retinal hypoxia and ganglion cell functional deficits, whereas Müller cell gliosis and more extensive decreases in neuronal function occur later. Astrocytes may play an early and key role in changes in retinal vasculature and inner retinal dysfunction in diabetes.
Publisher: IEEE
Date: 2008
Publisher: Springer Berlin Heidelberg
Date: 1995
DOI: 10.1007/BFB0020519
Publisher: Springer Science and Business Media LLC
Date: 10-07-2017
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: ACM
Date: 2008
Publisher: Association for Computing Machinery (ACM)
Date: 20-03-2020
DOI: 10.1145/3378428
Abstract: Members of the International Association for Cryptologic Research explore regional work and collaboration activities.
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: IEEE Comput. Soc
Date: 1999
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer Berlin Heidelberg
Date: 1998
DOI: 10.1007/BFB0053749
Publisher: Springer Berlin Heidelberg
Date: 1998
DOI: 10.1007/BFB0053748
Publisher: Oxford University Press (OUP)
Date: 27-07-2011
Publisher: IEEE Comput. Soc. Press
Date: 1996
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Elsevier BV
Date: 12-1985
Publisher: NADIA
Date: 30-11-2014
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Elsevier BV
Date: 09-2020
Publisher: ACM
Date: 02-2016
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Informa UK Limited
Date: 04-2012
DOI: 10.4161/AUTO.19496
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: ACM
Date: 02-2016
Publisher: Springer International Publishing
Date: 2020
Publisher: IOP Publishing
Date: 04-09-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2021
Publisher: IEEE
Date: 08-2008
Publisher: Springer Science and Business Media LLC
Date: 12-08-2016
DOI: 10.1038/SREP31350
Abstract: With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m -bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m -bonacci sequences to detect eavesdropping. Meanwhile, we encode m -bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.
Publisher: IEEE
Date: 08-2014
Publisher: Elsevier BV
Date: 04-2006
Publisher: Springer Berlin Heidelberg
Date: 1997
DOI: 10.1007/BFB0027926
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11780656_3
Publisher: arXiv
Date: 2020
Publisher: Elsevier BV
Date: 10-2014
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Springer Science and Business Media LLC
Date: 31-10-2014
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: IOP Publishing
Date: 11-2016
Publisher: IEEE
Date: 2005
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11958239_21
Publisher: IEEE
Date: 11-2014
DOI: 10.1109/CTC.2014.4
Publisher: Springer Science and Business Media LLC
Date: 31-03-2020
Publisher: Elsevier BV
Date: 02-2001
Publisher: Institution of Engineering and Technology (IET)
Date: 1988
Publisher: Springer Science and Business Media LLC
Date: 17-11-2020
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11836810_33
Publisher: ACM
Date: 21-03-2006
Publisher: Springer Berlin Heidelberg
Date: 1993
Publisher: IOP Publishing
Date: 06-2022
DOI: 10.1088/1755-1315/977/1/012104
Abstract: Despite great improvements in childhood mortality in the past several decades, many Indonesian children did not surpass their fifth birthday. This paper investigates the social and environmental determinants of under-five (U-5) mortality in Indonesia. By utilising the most recent Indonesia Demographic and Health Survey (IDHS) in 2017, we fitted survival regression models to the data. We observed that maternal smoking (aHR = 2.15, 95% CI = 1.15–4.03), maternal age (aHR = 2.48, 95% CI = 1.43–4.30), and maternal employment status (aHR = 1.68, 95% CI = 1.34–2.11) correspond to shorter lives of U-5 children. Conversely, we found that higher maternal education (aHR = 0.50, 95% CI = 0.29–0.87) corresponds to better child survival. Improved household sanitation also negatively associated with child mortality, albeit statistically insignificant at 5% (aHR = 0.78, 95% CI = 0.60–1.01). These associations hold after we take into account proximate and biological correlates. These findings corroborate extant literature that living environment (not only socio-economic and demographic factors) plays a prominent role in determining child survival. Hence, increasing access to and reducing the rural-urban gap related to improved sanitation facilities and curtailing smoking prevalence are paramount in further curbing child mortality.
Publisher: Elsevier BV
Date: 05-2007
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023304
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023306
Publisher: Springer Science and Business Media LLC
Date: 06-09-2011
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023307
Publisher: Association for Computing Machinery (ACM)
Date: 11-2002
Abstract: Malicious attacks on Web servers by intruders and hackers are prime concerns of organizations, administrators of Web sites, as well as users who access them.
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023308
Publisher: Springer Science and Business Media LLC
Date: 13-04-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 16-03-2022
DOI: 10.36227/TECHRXIV.19350680
Abstract: The recent expansion of the Internet of things (IoT) and its applications continues to dramatically change the IT services supporting manufacturing, energy management, intelligent transportation, smart cities, etc. These IT services often interconnect Internet-based Cloud systems with IoT or intelligent smart devices held by organisations. As IoT devices are resource-limited, the security of their communication is provided by lightweight cryptography that could consequently lead to the devices being insecure against a quantum adversary. On the other hand, Internet Cloud systems are resource-rich and could easily support post-quantum cryptography. This paper presents a proxy re-encryption scheme that translates ciphertexts of a classical lightweight encryption algorithm into their post quantum equivalent and vice versa. More precisely, we propose a lattice-based ABE-IBE (L ABE-IBE) proxy re-encryption scheme that transforms a classical lightweight ciphertext into a lattice based ciphertext. We compare our proposed L ABE-IBE proxy re-encryption scheme with classical proxy re-encryption (ABEIBE) schemes. We discuss the security and efficiency of our construction. /
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Springer Science and Business Media LLC
Date: 19-08-2016
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: IGI Global
Date: 04-2009
Abstract: There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Publisher: Springer Berlin Heidelberg
Date: 1985
Publisher: Springer Science and Business Media LLC
Date: 29-03-2022
DOI: 10.1038/S41598-022-09004-3
Abstract: Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1–DA5 and two key recovery attacks KRA1–KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3–DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers.
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2019
Publisher: ACM
Date: 24-05-2021
Publisher: IEEE
Date: 08-2017
Publisher: IEEE
Date: 12-2015
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2005
Publisher: Elsevier BV
Date: 08-1997
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IEEE
Date: 10-2014
Publisher: IEEE
Date: 11-2013
DOI: 10.1109/CTC.2013.4
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2007
Publisher: Springer Science and Business Media LLC
Date: 26-07-2022
Publisher: IOP Publishing
Date: 26-03-2019
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11967668_23
Publisher: Elsevier BV
Date: 08-2004
Publisher: IOP Publishing
Date: 04-2015
DOI: 10.1088/0253-6102/63/4/459
Abstract: In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely.
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Informa UK Limited
Date: 02-01-2016
Publisher: Springer Science and Business Media LLC
Date: 20-09-2007
Publisher: Springer Science and Business Media LLC
Date: 10-05-2012
Publisher: Springer Science and Business Media LLC
Date: 23-08-2012
Publisher: ACM
Date: 26-11-2013
Publisher: Elsevier BV
Date: 11-2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 16-03-2022
DOI: 10.36227/TECHRXIV.19350680.V1
Abstract: The recent expansion of the Internet of things (IoT) and its applications continues to dramatically change the IT services supporting manufacturing, energy management, intelligent transportation, smart cities, etc. These IT services often interconnect Internet-based Cloud systems with IoT or intelligent smart devices held by organisations. As IoT devices are resource-limited, the security of their communication is provided by lightweight cryptography that could consequently lead to the devices being insecure against a quantum adversary. On the other hand, Internet Cloud systems are resource-rich and could easily support post-quantum cryptography. This paper presents a proxy re-encryption scheme that translates ciphertexts of a classical lightweight encryption algorithm into their post quantum equivalent and vice versa. More precisely, we propose a lattice-based ABE-IBE (L ABE-IBE) proxy re-encryption scheme that transforms a classical lightweight ciphertext into a lattice based ciphertext. We compare our proposed L ABE-IBE proxy re-encryption scheme with classical proxy re-encryption (ABEIBE) schemes. We discuss the security and efficiency of our construction. /
Publisher: Springer Science and Business Media LLC
Date: 26-06-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-01-2022
DOI: 10.36227/TECHRXIV.17789735.V1
Abstract: Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our s le file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.
Publisher: BMJ
Date: 13-03-2017
DOI: 10.1136/BMJQS-2016-005867
Abstract: Standard risk screening and assessment forms are frequently used in strategies to prevent harm to older people in hospitals. Little is known about good practices for their use. Scope the preventable harms addressed by standard forms used to screen and assess older people and how standard forms are operationalised in hospitals across Victoria, Australia. Mixed methods study: (1) cross-sectional audit of the standard risk screening and assessment forms used to assess older people at 11 health services in 2015 (2) nine focus groups with a purposive s le of 69 participants at 9 health services. Descriptive analysis examined the number of items on forms, preventable harms assessed and sources of duplication. Qualitative thematic analysis of focus group data identified themes explaining issues commonly affecting how health services used the forms. 152 standard assessment forms from 11 Victorian health services included over 3700 items with 17% duplicated across multiple forms. Assessments of skin integrity and mobility loss (including falls) were consistently included in forms however, nutrition, cognitive state, pain and medication risks were inconsistent and continence, venous thromboembolism risk and hospital acquired infection from invasive devices were infrequent. Qualitative analyses revealed five themes explaining issues associated with current use of assessment forms: (1) comprehensive assessment of preventable harms (2) burden on staff and the older person, (3) interprofessional collaboration, (4) flexibility to in idualise care and (5) information management. Ex les of good practice were identified. Current use of standard risk screening and assessment forms is associated with a high burden and gaps in assessment of several common preventable harms that can increase risk to older people in hospital. Improvement should focus on streamlining forms, increased guidance on interventions to prevent harm and facilitating front-line staff to manage complex decisions.
Publisher: Springer Science and Business Media LLC
Date: 30-10-2012
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Springer Science and Business Media LLC
Date: 17-02-2022
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11779360_14
Publisher: Informa UK Limited
Date: 05-2011
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: IEEE
Date: 02-2010
DOI: 10.1109/ARES.2010.65
Publisher: Springer Science and Business Media LLC
Date: 11-08-2018
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 02-2010
DOI: 10.1109/ARES.2010.66
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11935230_13
Publisher: IOP Publishing
Date: 06-2019
DOI: 10.1088/1757-899X/546/5/052052
Abstract: Lognormal distribution plays an essential role in the distribution modeling of right-skewed data in many areas. In social sciences, for instance, it can be used to model women’s age at first marriage pattern, a key indicator in studying fertility patterns. Distribution fitting is a fundamental and essential stage of data modeling before doing advancing the analysis. Kolmogorov-Smirnov (KS) distance is applicable as maximum goodness-of-fit (GOF) estimators for distribution parameters. Minimizing KS distance is optimization problem. Particle swarm optimization (PSO) algorithm is a general optimizer that can handle various optimization problems. This study assesses the characteristics of minimum KS distance estimator for lognormal distribution parameters. KS distance estimators were obtained via optimization using the PSO algorithm, so the combination of these is called the PSO-KS algorithm. We conducted a simulation to assess the performance of PSO-KS, Maximum Likelihood (MLE), Method of Moment (MME). The bias and mean square error (MSE) of point estimators were used in simulation to assess the characteristics of estimators. Meanwhile, MSE of distribution fitting, KS distance, and log-likelihood value were used to evaluate the GOF characteristics. Moreover, we demonstrated the performance of the algorithm by implementing it to women’s age at first marriage data in Indonesia. The results show that based on the bias and MSE properties, the PSO-KS point estimators yield similar characteristics with MLE, but better than MME. From the GOF perspective, PSO-KS outperforms in MSE of distribution fitting and KS distance, but not in log-likelihood value. We also observed these patterns in the women’s age at first marriage data. The contributions of this study are two-fold, first to assess the PSO-KS algorithm in the lognormal distribution case. Second, it implements the algorithm on women’s age at first marriage data, which has broad social, economic, and public health implications.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2015
Publisher: Springer Berlin Heidelberg
Date: 2000
Publisher: Institution of Engineering and Technology (IET)
Date: 1997
DOI: 10.1049/EL:19970980
Publisher: Elsevier BV
Date: 02-2009
Publisher: Springer International Publishing
Date: 2022
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11745853_11
Publisher: Springer Science and Business Media LLC
Date: 08-2006
Publisher: Springer Science and Business Media LLC
Date: 07-05-2018
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: Elsevier BV
Date: 05-2011
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: MDPI AG
Date: 17-04-2023
DOI: 10.3390/E25040672
Abstract: Source coding has a rich and long history. However, a recent explosion of multimedia Internet applications (such as teleconferencing and video streaming, for instance) renews interest in fast compression that also squeezes out as much redundancy as possible. In 2009 Jarek Duda invented his asymmetric numeral system (ANS). Apart from having a beautiful mathematical structure, it is very efficient and offers compression with a very low coding redundancy. ANS works well for any symbol source statistics, and it has become a preferred compression algorithm in the IT industry. However, designing an ANS instance requires a random selection of its symbol spread function. Consequently, each ANS instance offers compression with a slightly different compression ratio. The paper investigates the compression optimality of ANS. It shows that ANS is optimal for any symbol sources whose probability distribution is described by natural powers of 1/2. We use Markov chains to calculate ANS state probabilities. This allows us to precisely determine the ANS compression rate. We present two algorithms for finding ANS instances with a high compression ratio. The first explores state probability approximations in order to choose ANS instances with better compression ratios. The second algorithm is a probabilistic one. It finds ANS instances whose compression ratios can be made as close to the best ratio as required. This is done at the expense of the number θ of internal random “coin” tosses. The algorithm complexity is O(θL3), where L is the number of ANS states. The complexity can be reduced to O(θLlog2L) if we use a fast matrix inversion. If the algorithm is implemented on a quantum computer, its complexity becomes O(θ(log2L)3).
Publisher: Elsevier BV
Date: 10-2020
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: American Physical Society (APS)
Date: 24-03-2022
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Elsevier BV
Date: 05-2011
Publisher: Springer Science and Business Media LLC
Date: 13-04-2017
DOI: 10.1038/SREP46302
Abstract: Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.
Publisher: Springer Berlin Heidelberg
Date: 2000
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023299
Publisher: Springer International Publishing
Date: 2019
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Academy Publisher
Date: 04-2007
Publisher: Springer Berlin Heidelberg
Date: 1996
DOI: 10.1007/BFB0023291
Publisher: Springer Berlin Heidelberg
Date: 2006
DOI: 10.1007/11734727_19
Publisher: Institution of Engineering and Technology (IET)
Date: 11-2018
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 1986
Publisher: Society for Industrial & Applied Mathematics (SIAM)
Date: 2010
DOI: 10.1137/080733802
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: IEEE
Date: 12-2009
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2015
Publisher: IEEE
Date: 05-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-01-2022
DOI: 10.36227/TECHRXIV.17789735
Abstract: Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our s le file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: ACM
Date: 05-12-2022
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Cambridge University Press (CUP)
Date: 07-2003
DOI: 10.1017/S1355617703950132
Abstract: We present the case of a 23-year-old Vietnamese male with a 2-year history of a psychotic illness marked by prominent negative symptoms, fatuousness and disturbed behavior. Neuroimaging revealed a prominent vascular flow void affecting the middle and anterior cerebral arteries, with associated increased collateral supply to the frontal cortex, consistent with Moyamoya disease. Neurological examination was unremarkable however, neuropsychological assessment revealed significant executive dysfunction, including stimulus-driven behavior. Whilst the diagnosis of schizophrenia and Moyamoya disease may be coincidental, an interaction between the 2 diseases may have led to some of the atypical features of this case, including prominent executive dysfunction and marked sensitivity to psychotropic medication. We discuss the nature of possible interactions between the 2 conditions. This case also highlights the importance of re-evaluating patients with atypical or treatment-resistant psychoses for cerebral pathology. ( JINS , 2003, 9 , 806–810.)
Publisher: Springer Science and Business Media LLC
Date: 11-04-2014
Location: Germany
Location: Australia
Start Date: 2004
End Date: 2009
Funder: Australian Research Council
View Funded ActivityStart Date: 2003
End Date: 2003
Funder: Australian Research Council
View Funded ActivityStart Date: 2015
End Date: 2018
Funder: Fundacja na rzecz Nauki Polskiej
View Funded ActivityStart Date: 2018
End Date: 2020
Funder: Australian Research Council
View Funded ActivityStart Date: 2003
End Date: 12-2006
Amount: $225,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2009
End Date: 12-2014
Amount: $512,140.00
Funder: Australian Research Council
View Funded ActivityStart Date: 07-2007
End Date: 12-2012
Amount: $230,643.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2018
End Date: 06-2024
Amount: $413,043.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2004
End Date: 12-2006
Amount: $85,668.00
Funder: Australian Research Council
View Funded ActivityStart Date: 11-2003
End Date: 12-2008
Amount: $69,099.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2004
End Date: 03-2007
Amount: $210,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2006
End Date: 12-2009
Amount: $351,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 11-2003
End Date: 12-2004
Amount: $20,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2004
End Date: 12-2004
Amount: $10,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 12-2004
End Date: 12-2010
Amount: $1,950,000.00
Funder: Australian Research Council
View Funded Activity