533 research outputs found

    Timed Analysis of Security Protocols

    Get PDF
    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the well known Clark Jacob library and the Security Protocol Open Repository (SPORE) library. Finally, we present some new challenges and threats that arise when considering time in the analysis, by providing a novel protocol that uses time challenges and exposing a timing attack over an implementation of an existing security protocol

    Varijacija i norma u hrvatskom crkvenoslavenskom

    Get PDF
    On the basis of A. Issatschenko\u27s definition of "literary language" and P. Rehder\u27s recent explication of that definition with the reference to medieval Croatia, the author concludes that Croatian Chruch Slavonic (CCS), neither by itself nor as part of a functional unity including also the čakavian dialect, texts composed in that dialect, and mixed čakavian-CCS text, could be characterized as a literary language. Medieval Croatian literacy was based on the coexistence of two independent sociolinguistic systems. One was the "Latinic complex", based on Latin-Čakavian bilingualism. Its most visible characteristics were the Latinic script and Latin liturgy. The second was the "Glagolitic complex", based on CCS-čakavian diglossia. The most visible features of this complex were the Glagolitic script and Slavonic liturgy. Croatian diglossia was probably of the type which the High and Low variants represent not only a functional, but also a linguistic unity. In the absence of explicit codification (grammatical-orthographical manuals and/or polemics concerning the linguistic norm), the norm was established and maintained through the example of the most authoritative texts. In such a situation, one genre (or group of genres) had to be set apart as an exemplary genre, in which infiltration of non-normative elements was not allowed. Stylistically motivated deviation from the norm in other genres would be conditioned by the establishment and documentation of the norm in the exemplary genre. The author suggests as a working hypothesis that the exemplary genre of CCS consisted of the biblical lections (i. e. lectionary) of the missal.Varijacija i norma u hrvatskom crkvenoslavenskom Na temelju Isačenkove definicije književnog jezika i Rehderova nedavna objašnjenja definicije u odnosu na srednjovjekovnu Hrvatsku, autor zaključuje da hrvatski crkvenoslavenski (HC), ni samostalno ni kao dio funkcionalnog jedinstva koje uključuje i čakavski dijalekt, ne može biti određen kao književni jezik. Srednjovjekovna hrvatska književnost temeljila se na supostojanju dvaju neovisnih sociolingvističkih sustava. Jedan je bio "latinski kompleks", koji se temeljio na latinsko-čakavskoj dvojezičnosti (bilingvizmu). Njegovo najočitije svojstvo bila je latinica i latinska liturgija. Drugi je "glagoljski kompleks", koji se temelji na HC-čakavskoj diglosiji. Najočitija svojstva toga kompleksa bila su glagoljica i slavenska liturgija. Hrvatska diglosija vjerojatno je takva u kojoj visoka i niska varijanta pokazuju ne samo funkcionalno već i lingvističko jedinstvo. U nedostatku eksplicitne kodifikacije (gramatičko-ortografski priručnik i/ili polemike o lingvističkoj normi) norma je uspostavljena i održavana na primjeru najautoritativnijih tekstova. U tom slučaju, jedan žanr (ili skupina žanrova) morao se istaknuti kao primjerni žanr u kojem infiltracija nenormativnih elemenata nije dopuštena. Stilistički motivirano odstupanje od norme u drugim žanrovima bilo bi uvjetovano uspostavom dokumentacije norme u primjernom žanru. Autor predlaže radnu hipotezu da se primjerni žanr HC sastojao od biblijskih lekcija (tj. lekcionara) iz misala

    The Audit Logic: Policy Compliance in Distributed Systems

    Get PDF
    We present a distributed framework where agents can share data along with usage policies. We use an expressive policy language including conditions, obligations and delegation. Our framework also supports the possibility to refine policies. Policies are not enforced a-priori. Instead policy compliance is checked using an a-posteriri auditing approach. Policy compliance is shown by a (logical) proof that the authority can systematically check for validity. Tools for automatically checking and generating proofs are also part of the framework.\u

    On the Localization of One-Photon States

    Get PDF
    Single photon states with arbitrarily fast asymptotic power-law fall-off of energy density and photodetection rate are explicitly constructed. This goes beyond the recently discovered tenth power-law of the Hellwarth-Nouchi photon which itself superseded the long-standing seventh power-law of the Amrein photon.Comment: 7 pages, tex, no figure

    Automating Security Analysis: Symbolic Equivalence of Constraint Systems

    Get PDF
    We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence

    Ultraviolet writing of channel waveguides in proton-exchanged LiNbO<sub>3</sub>

    No full text
    We report on a direct ultraviolet (UV) writing method for the fabrication of channel waveguides at 1.55 µm in LiNbO3 through UV irradiation of surface and buried planar waveguides made by annealed proton exchange and reverse proton exchange. A systematic study of the guidance properties as a function of the UV writing conditions is presented

    A two-way photonic interface for linking Sr+ transition at 422 nm to the telecommunications C-band

    Full text link
    We report a single-stage bi-directional interface capable of linking Sr+ trapped ion qubits in a long-distance quantum network. Our interface converts photons between the Sr+ emission wavelength at 422 nm and the telecoms C-band to enable low-loss transmission over optical fiber. We have achieved both up- and down-conversion at the single photon level with efficiencies of 9.4% and 1.1% respectively. Furthermore we demonstrate noise levels that are low enough to allow for genuine quantum operation in the future.Comment: 5 pages, 4 figure

    Verbal learning impairment in euthymic bipolar disorder: BDI v BDII

    Get PDF
    AbstractObjectivesCognitive impairment is known to occur in bipolar disorder (BD), even in euthymic patients, with largest effect sizes often seen in Verbal Learning and Memory Tasks (VLT). However, comparisons between BD Type-I and Type-II have produced inconsistent results partly due to low sample sizes.MethodsThis study compared the performance of 183 BDI with 96 BDII out-patients on an adapted version of the Rey Verbal Learning Task. Gender, age, years of education, mood scores and age at onset were all used as covariates. Current medication and a variety of illness variables were also investigated for potential effects on VLT performance.ResultsBDI patients were significantly impaired relative to BDII patients on all five VLT outcome measures after controlling for the other variables [Effect Sizes=.13–.17]. The impairments seem to be unrelated to drug treatment and largely unrelated to illness variables, although age of onset affected performance on three outcome measures and number of episodes of mood elevation affected performance on one.LimitationsThis study used historical healthy controls. Analysis of potential drug effects was limited by insufficient participants not being drug free. Cross-sectional nature of the study limited the analysis of the potential effect of illness variables.ConclusionsThis study replicates earlier findings of increased verbal learning impairment in BDI patients relative to BDII in a substantially larger sample. Such performance cannot be wholly explained by medication effects or illness variables. Thus, the cognitive impairment is likely to reflect a phenotypic difference between bipolar sub-types

    AnBx - Security Protocols Design and Verification

    Get PDF
    Designing distributed protocols is challenging, as it requires actions at very different levels: from the choice of network-level mechanisms to protect the exchange of sensitive data, to the definition of structured interaction patterns to convey application-specific guarantees. Current security infrastructures provide very limited support for the specification of such guarantees. As a consequence, the high-level security properties of a protocol typically must often be hard-coded explicitly, in terms of low-level cryptographic notions and devices which clutter the design and undermine its scalability and robustness. To counter these problems, we propose an extended Alice &amp; Bob notation for protocol narrations (AnBx) to be employed for a purely declarative modelling of distributed protocols. These abstractions provide a compact specification of the high-level security guarantees they convey, and help shield the design from the details of the underlying cryptographic infrastructure. We discuss an implementation of the abstractions based on a translation from the AnBx notation to the AnB language supported by the OFMC [1,2] verification tool. We show the practical effectiveness of our approach by revisiting the iKP e-payment protocols, and showing that the security goals achieved by our declarative specification outperform those offered by the original protocols
    corecore