Digital microfluidic biochips: recent research and emerging challenges
Microfluidic biochips are replacing the conventional biochemical analyzers, and are able to
integrate on-chip all the basic functions for biochemical analysis. The" digital" microfluidic …
integrate on-chip all the basic functions for biochemical analysis. The" digital" microfluidic …
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
We devise an abstraction of zero-knowledge protocols that is accessible to a fully
mechanized analysis. The abstraction is formalized within the applied pi-calculus using a …
mechanized analysis. The abstraction is formalized within the applied pi-calculus using a …
Visual programming for next-generation sequencing data analytics
Background High-throughput or next-generation sequencing (NGS) technologies have
become an established and affordable experimental framework in biological and medical …
become an established and affordable experimental framework in biological and medical …
Breaking and fixing public-key Kerberos
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely
deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate …
deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate …
Type-checking zero-knowledge
This paper presents the first type system for statically analyzing security protocols that are
based on zero-knowledge proofs. We show how certain properties offered by zero …
based on zero-knowledge proofs. We show how certain properties offered by zero …
Cryptographically sound security proofs for basic and public-key kerberos
We present a computational analysis of basic Kerberos and Kerberos with public-key
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …
Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
Cloud computing refers to a network-enabled service that allows users to access large data
centres and web services through the internet. A hybrid cloud comprises of both private and …
centres and web services through the internet. A hybrid cloud comprises of both private and …
Computationally sound mechanized proofs for basic and public-key Kerberos
We present a computationally sound mechanized analysis of Kerberos 5, both with and
without its public-key extension PKINIT. We prove authentication and key secrecy properties …
without its public-key extension PKINIT. We prove authentication and key secrecy properties …
Provable-security analysis of authenticated encryption in Kerberos
A Boldyreva, V Kumar - IET information security, 2011 - IET
Kerberos is a widely deployed network authentication protocol currently being considered
for standardisation. Many works have analysed its security, identifying flaws and often …
for standardisation. Many works have analysed its security, identifying flaws and often …
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have
been heavily scrutinized, providing some assurance of resistance to malicious attacks and …
been heavily scrutinized, providing some assurance of resistance to malicious attacks and …