2008
Autores
Barbosa, M; Farshim, P;
Publicação
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
Abstract
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures, offering better overall performance and security. In this paper, we introduce the notion of certificateless signcryption and present an efficient construction which guarantees security under insider attacks, and therefore provides forward secrecy and non-repudiation. Copyright 2008 ACM.
2008
Autores
Barbosa, M; Brouard, T; Cauchie, S; de Sousa, SM;
Publicação
INFORMATION SECURITY AND PRIVACY
Abstract
We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme.
2007
Autores
Correia, A; Pereira, J; Rodrigues, L; Carvalho, N; Vilaca, R; Oliveira, R; Guedes, S;
Publicação
Sixth IEEE International Symposium on Network Computing and Applications, Proceedings
Abstract
2007
Autores
Carvalho, N; Pereira, J; Oliveira, R; Rodrigues, L;
Publicação
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS
Abstract
In epidemic or gossip-based multicast protocols, each node simply relays each message to some random neighbors, such that all destinations receive it at least once with high probability. In sharp contrast, structured multicast protocols explicitly build and use a spanning tree to take advantage of efficient paths, and aim at having each message received exactly once. Unfortunately, when failures occur, the tree must be rebuilt. Gossiping thus provides simplicity and resilience at the expense of performance and resource efficiency. In this paper we propose a novel technique that exploits knowledge about the environment to schedide payload transmission when gossiping. The resulting protocol retains the desirable qualities of gossip, but approximates the performance of structured multicast. In some sense, instead of imposing structure by construction, we let it emerge from the operation of the gossip protocol. Experimental evaluation shows that this approach is effective even when knowledge about the environment is only approximate.
2007
Autores
Carvalho, N; Correia, A; Pereira, J; Rodrigues, L; Oliveira, R; Guedes, S;
Publicação
JOURNAL OF UNIVERSAL COMPUTER SCIENCE
Abstract
The Database Management System ( DBMS) used to be a commodity software component, with well known standard interfaces and semantics. However, the performance and reliability expectations being placed on DBMSs have increased the demand for a variety add-ons, that augment the functionality of the database in a wide range of deployment scenarios, offering support for features such as clustering, replication, and self-management, among others. A well known software engineering approach to systems with such requirements is reflection. Unfortunately, standard reflective interfaces in DBMSs are very limited. Some of these limitations may be circumvented by implementing reflective features as a wrapper to the DBMS server. Unfortunately, these solutions comes at the expense of a large development effort and significant performance penalty.
2007
Autores
Mackie, I; Pinto, JS; Vilaça, M;
Publicação
ECEASST
Abstract
In this paper we propose to use Interaction Nets as a formalism for Visual Functional Programming. We consider the use of recursion patterns as a programming idiom, and introduce a suitable archetype/instantiation mechanism for interaction agents, which allows one to define agents whose behaviour is based on recursion patterns. © 2007, Universitatsbibliothek TU Berlin.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.