• Home
  • Science General
  • Advances in Network and Distributed Systems Security (IFIP by Bart De Decker, Frank Piessens, Jan Smits, Els Van

Advances in Network and Distributed Systems Security (IFIP by Bart De Decker, Frank Piessens, Jan Smits, Els Van

By Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen

The extra our society depends upon digital kinds of communique, the extra the safety of those conversation networks is vital for its well-functioning. therefore, learn on equipment and strategies to enhance community safety is very very important. themes during this quantity comprise the newest advancements in: safety protocols; safe software program engineering; cellular agent safety; E-commerce safeguard; safeguard for disbursed computing. ?/LIST? Advances in community and disbursed structures safeguard comprises the complaints of the 1st overseas operating convention on community safety (I-NetSec 01), which was once subsidized through the overseas Federation for info Processing (IFIP), and held in Leuven, Belgium in November 2001. This quantity could be crucial for researchers and practitioners operating during this interesting and fast-evolving box.

Show description

Read or Download Advances in Network and Distributed Systems Security (IFIP International Federation for Information Processing) PDF

Similar science (general) books

Additional resources for Advances in Network and Distributed Systems Security (IFIP International Federation for Information Processing)

Sample text

Atomic Verifiability. (Voters are able to verify that their vote has been counted correctly). In Step 6, all the time-lock puzzles of the votes are published by the Voting Center. Victor can check that his time-lock puzzle has been published on the board. If not, Victor makes an open objection: he anonymously broadcasts the receipt that was sent to him in Step 4. Receipt-Freeness. (No voter is able to prove the value of its vote). The receipt freeness property is separately discussed in Section 2.

This is called an ‘‘open objection to the tally”, introduced by Sako in [18]. Tallying Stage. In Step 7, the Registrar sends the secret trapdoor @ ( n )to the Voting Center, by using an untappable channel. The Voting Center uses @(n)to solve the time-lock puzzles of the votes. e. , N . , TLP(vote, )]. 5. Security Analysis We evaluate the security of our scheme by examining some basic requirements, which most researchers seem to agree upon [6, 20]: Eligibility. (Only authorized voters are able to vote).

In [15] there are tamper-resistant smartcards that keep some information secret from the voter. Most other schemes 1, 2, 9, 10, 12, 13, 14, 19] make physical assumptions about the communication channel between the voter and the election authorities. More specifically, they assume the existence of : Untappable channels from the voter to the authority [13, 14] rn Untappable channels from the authority to the voter [l, 9, 10, 19] Physical Voting Booths [2, 12]. In [9], it is argued that ‘‘one-way channels from the authorities to the voters are the weakest physical assumption for which receipt-free voting protocols are known to exist”.

Download PDF sample

Rated 4.34 of 5 – based on 20 votes