Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Behavior-Based (1)
- Biological Agents (1)
- Biological Attacks (1)
- Biological Detection (1)
- Certificate-based signature (1)
-
- Chemical Agents (1)
- Computational Diffie–Hellman assumption (1)
- Detection Hardware (1)
- Engineering, Computer Engineering, Computer Sciences, Digital Communications and Networking, Information Security (1)
- Formal Verification (1)
- Forward security (1)
- Operational Environment (1)
- Random oracle model (1)
- Robotics (1)
- Sensors (1)
- Validation (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian Lyons, Ron Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, Julia Deeb
Getting It Right The First Time: Robot Mission Guarantees In The Presence Of Uncertainty, Damian Lyons, Ron Arkin, Paramesh Nirmal, Shu Jiang, Tsung-Ming Liu, Julia Deeb
Faculty Publications
Abstract—Certain robot missions need to perform predictably in a physical environment that may only be poorly characterized in advance. We have previously developed an approach to establishing performance guarantees for behavior-based controllers in a process-algebra framework. We extend that work here to include random variables, and we show how our prior results can be used to generate a Dynamic Bayesian Network for the coupled system of program and environment model. Verification is reduced to a filtering problem for this network. Finally, we present validation results that demonstrate the effectiveness of the verification of a multiple waypoint robot mission using this …
A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou
A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou
Faculty Publications
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure raises a serious concern. In an effort to address the key exposure problem, the notion of forward security was first presented by Günther in 1990. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given time period does not enable an adversary to ‘break’ the scheme for any prior time period. In this paper, we first introduce forward security into certificate-based cryptography and define the security model of forward-secure certificate-based signatures (CBSs). …
Why A 15 Minute Biological Detection System?, Doug Lewis
Why A 15 Minute Biological Detection System?, Doug Lewis
Faculty Publications
The biological defense community needs to take a hard look at the requirements and assumptions we use to develop our biological sensors. Today the point sensors currently deployed or in development can offer at best “near real time” detection. This translates into approximately 10-20 minutes from the time an agent passes over the device until an alarm is issued. Why are we working to develop detection hardware which in reality contributes little to no advantage to an operational environment? Should the DOD resist fielding (in the near term) “near real time” detection systems, and instead field slower (but much more …