3,103 research outputs found

    MCQUIC: Multicast and unicast in a single transport protocol

    Full text link
    Multicast enables efficient one-to-many communications. Several applications benefit from its scalability properties, e.g., live-streaming and large-scale software updates. Historically, multicast applications have used specialized transport protocols. The flexibility of the recently standardized QUIC protocol opens the possibility of providing both unicast and multicast services to applications with a single transport protocol. We present MCQUIC, an extended version of the QUIC protocol that supports multicast communications. We show how QUIC features and built-in security can be leveraged for multicast transport. We present the design of MCQUIC and implement it in Cloudflare quiche. We assess its performance through benchmarks and in emulated networks under realistic scenarios. We also demonstrate MCQUIC in a campus network. By coupling QUIC with our multicast extension, applications can rely on multicast for efficiency with the possibility to fall back on unicast in case of incompatible network conditions.Comment: 13 page

    Stability comparison of two absolute gravimeters: optical versus atomic interferometers

    Get PDF
    We report the direct comparison between the stabilities of two mobile absolute gravimeters of different technology: the LNE-SYRTE Cold Atom Gravimeter and FG5X\#216 of the Universit\'e du Luxembourg. These instruments rely on two different principles of operation: atomic and optical interferometry. The comparison took place in the Walferdange Underground Laboratory for Geodynamics in Luxembourg, at the beginning of the last International Comparison of Absolute Gravimeters, ICAG-2013. We analyse a 2h10 duration common measurement, and find that the CAG shows better immunity with respect to changes in the level of vibration noise, as well as a slightly better short term stability.Comment: 6 page

    Les dimensions des crises: analyse de deux études de cas sous les approches processuelle et événementielle

    Get PDF
    Due to their protean character, crises are unique and they demand specific actions. In order to offer managers a referential framework to better deal with crises, many authors have tried to identify and to classify them. Thus, two main approaches can be located: those qualified as event-driven (mainly based on the elements that trigged out the crisis and its consequences) and those qualified as a process-driven (which places the crisis in a context full of meanings, actors and victims). The aim of this work is to analyze an organizational crisis within two organizations (a French one and a Brazilian one) by using these two approaches. The results show, among other aspects, that the event-driven approach allows a more complete visualization of these critical situations regarding the event-driven approach. Besides, the analysis of the crisis dimensions shows that a systemic approach of crisis events, the capitalization over experiences and an optimistic and proactive posture performed by the managers are the key elements in this study of crisis management.En raison de leur caractère protéiforme, les cas de crise sont uniques et ils exigent des actions spécifiques. Afin d'offrir aux gestionnaires un cadre de référence pour mieux les affronter, de nombreux auteurs ont tenté d'identifier et de classifier les crises. Ainsi, deux approches principales peuvent être repérées : celle qualifiée d'événementielle (plutôt centrée sur les éléments déclencheurs des crises et ses conséquences) et celle caractérisée de processuelle (qui situe la crise dans un contexte plein de significations, acteurs et victimes). L'objectif de ce travail sera d'analyser une crise organisationnelle dans deux entreprises (française et brésilienne) en faisant cohabiter ces deux approches. Les résultats indiquent, parmi d'autres aspects, que l'approche processuelle permet une visualisation beaucoup plus complète des situations critiques par rapport à l'approche événementielle. En plus, l'analyse des dimensions de crise montre que une approche systémique des événements de crise, la capitalisation sur les expériences vécues et une posture optimiste et proactive des gestionnaires ressortent de cette étude comme éléments clé de la gestion des crises

    Individual Verifiability and Revoting in the Estonian Internet Voting System

    Get PDF
    Individual verifiability remains one of the main practical challenges in e-voting systems and, despite the central importance of this property, countries that sought to implement it faced repeated security problems. In this note, we revisit this property in the context of the IVXV version of the Estonian voting system, which has been in used for the Estonian municipal elections of 2017 and for the Estonian and European parliamentary elections of 2019. We show that a compromised voter device can defeat the individual verifiability mechanism of the current Estonian voting system. Our attack takes advantage of the revoting option that is available in the Estonian voting system, and only requires compromise of the voting client application: it does not require compromising the mobile device verification app, or any server side component

    Modeling Computational Security in Long-Lived Systems, Version 2

    Get PDF
    For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., super-polynomial). In such cases, security cannot be guaranteed in the traditional sense: a computationally secure protocol may become insecure if the attacker has a super-polynomial number of interactions with the protocol. This paper proposes a new paradigm for the analysis of long-lived security protocols. We allow entities to be active for a potentially unbounded amount of real time, provided they perform only a polynomial amount of work per unit of real time. Moreover, the space used by these entities is allocated dynamically and must be polynomially bounded. We propose a new notion of long-term implementation, which is an adaptation of computational indistinguishability to the long-lived setting. We show that long-term implementation is preserved under polynomial parallel composition and exponential sequential composition. We illustrate the use of this new paradigm by analyzing some security properties of the long-lived timestamping protocol of Haber and Kamat
    • …
    corecore