Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang Jul 2005

Proving Secure Properties Of Cryptographic Protocols With Knowledge Based Approach, Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang

Computer Science Faculty Research & Creative Works

Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals' knowledge and belief states. An example of public key authentication protocols has been studied and analysed.


Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman Mar 2005

Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman

Theses and Dissertations

The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …


Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon Mar 2005

Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon

Theses and Dissertations

Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic topology, limited throughput, and energy constraints. New routing protocols have been designed for use in MANETs, but have not been thoroughly tested under realistic conditions such as node movement, number of sources, the presence of obstacles, and node speed. This research evaluates the performance of ad hoc on-demand distance vector routing with respect to throughput, goodput ratio, end-to-end (ETE) delay, node pair packet delivery rate, and node pair end-to-end delay. It shows these performance metrics vary significantly according to the choice …


Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson Jan 2005

Lessons Learned With Arc, An Oai-Pmh Service Provider, Xiaoming Liu, Kurt Maly, Michael L. Nelson

Computer Science Faculty Publications

Web-based digital libraries have historically been built in isolation utilizing different technologies, protocols, and metadata. These differences hindered the development of digital library services that enable users to discover information from multiple libraries through a single unified interface. The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) is a major, international effort to address technical interoperability among distributed repositories. Arc debuted in 2000 as the first end-user OAI-PMH service provider. Since that time, Arc has grown to include nearly 7,000,000 metadata records. Arc has been deployed in a number of environments and has served as the basis for many other …