12 research outputs found

    The Hush Cryptosystem

    Full text link
    In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all. We employ a modified Word Substitution Method known as the Grammatical Substitution Method in our cryptosystem. We also make use of Hidden Markov Models. We test our cryptosystem using a computer program written in the Java Programming Language. Finally, we test the output of our cryptosystem using statistical tests.Comment: 7 pages. 5 figures. Appeared in the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turkey; Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turke

    A Precise Information Flow Measure from Imprecise Probabilities

    Full text link
    Dempster-Shafer theory of imprecise probabilities has proved useful to incorporate both nonspecificity and conflict uncertainties in an inference mechanism. The traditional Bayesian approach cannot differentiate between the two, and is unable to handle non-specific, ambiguous, and conflicting information without making strong assumptions. This paper presents a generalization of a recent Bayesian-based method of quantifying information flow in Dempster-Shafer theory. The generalization concretely enhances the original method removing all its weaknesses that are highlighted in this paper. In so many words, our generalized method can handle any number of secret inputs to a program, it enables the capturing of an attacker's beliefs in all kinds of sets (singleton or not), and it supports a new and precise quantitative information flow measure whose reported flow results are plausible in that they are bounded by the size of a program's secret input, and can be easily associated with the exhaustive search effort needed to uncover a program's secret information, unlike the results reported by the original metric.Comment: 10 pages. Appeared in the 6th International Conference on Software Security and Reliability (SERE 2012), Washington D.C., The United States, Proceedings of the 6th International Conference on Software Security and Reliability (SERE 2012), Washington D.C., The United State

    Scandinavian SD - The SAFE Way

    No full text
    People of various interests talk about Sustainable Development (SD) and in their talks they understandSD very differently. A lexicographer for example may define SD according to Oxford AdvancedLearner\u27s Dictionary as "the use of natural products and energy in a way that does not harm theenvironment". While a passer-by may happily dub her society as sustainable if it is providing her withher life needs while considering the needs of generations to come over a very long time. To take it toan extreme edge, the philosopher Luc Ferry [1] defines SD by saying: "I know that this term isobligatory, but I find it also absurd, or rather so vague that it says nothing!".In this paper we try to define and measure SD in Scandinavian countries using a novel mathematicalapproach. We rely on a non-concrete model for this purpose; namely the SAFE model, which is basedon concepts derived from fuzzy logic. It is widely believed that the application of fuzzy logic bringspowerful reasoning abilities in disciplines where concrete mathematical models do not exist; and SD isone such discipline. In fact, fuzzy logic is an outstanding tool for mimicking human thinking andforesight. Based on the SAFE model, we give a careful assessments of sustainability in each of theScandinavian countries. We also undergo a trend monitoring combined with a sensitivity analysis inorder to stand on the most important sustainability factors in each of these countries

    Towards a unified model of outdoor and indoor spaces

    No full text

    The BagTrack Project - An Overview

    No full text

    Reasoning about RFID-tracked moving objects in symbolic indoor spaces

    No full text

    Unified Modeling and Reasoning in Outdoor and Indoor Spaces

    No full text
    corecore