Digital microfluidic biochips: recent research and emerging challenges

TY Ho, K Chakrabarty, P Pop - Proceedings of the seventh IEEE/ACM …, 2011 - dl.acm.org
Microfluidic biochips are replacing the conventional biochemical analyzers, and are able to
integrate on-chip all the basic functions for biochemical analysis. The" digital" microfluidic …

Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol

M Backes, M Maffei, D Unruh - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
We devise an abstraction of zero-knowledge protocols that is accessible to a fully
mechanized analysis. The abstraction is formalized within the applied pi-calculus using a …

Visual programming for next-generation sequencing data analytics

F Milicchio, R Rose, J Bian, J Min, M Prosperi - BioData mining, 2016 - Springer
Background High-throughput or next-generation sequencing (NGS) technologies have
become an established and affordable experimental framework in biological and medical …

Breaking and fixing public-key Kerberos

I Cervesato, AD Jaggard, A Scedrov, JK Tsay… - Information and …, 2008 - Elsevier
We report on a man-in-the-middle attack on PKINIT, the public key extension of the widely
deployed Kerberos 5 authentication protocol. This flaw allows an attacker to impersonate …

Type-checking zero-knowledge

M Backes, C Hritcu, M Maffei - Proceedings of the 15th ACM conference …, 2008 - dl.acm.org
This paper presents the first type system for statically analyzing security protocols that are
based on zero-knowledge proofs. We show how certain properties offered by zero …

Cryptographically sound security proofs for basic and public-key kerberos

M Backes, I Cervesato, AD Jaggard, A Scedrov… - … –ESORICS 2006: 11th …, 2006 - Springer
We present a computational analysis of basic Kerberos and Kerberos with public-key
authentication (PKINIT) in which we consider authentication and key secrecy properties. Our …

Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos

SK Tiwari, SG Neogi - SN Computer Science, 2023 - Springer
Cloud computing refers to a network-enabled service that allows users to access large data
centres and web services through the internet. A hybrid cloud comprises of both private and …

Computationally sound mechanized proofs for basic and public-key Kerberos

B Blanchet, AD Jaggard, A Scedrov… - Proceedings of the 2008 …, 2008 - dl.acm.org
We present a computationally sound mechanized analysis of Kerberos 5, both with and
without its public-key extension PKINIT. We prove authentication and key secrecy properties …

Provable-security analysis of authenticated encryption in Kerberos

A Boldyreva, V Kumar - IET information security, 2011 - IET
Kerberos is a widely deployed network authentication protocol currently being considered
for standardisation. Many works have analysed its security, identifying flaws and often …

Rule-based static analysis of network protocol implementations

O Udrea, C Lumezanu, JS Foster - Information and Computation, 2008 - Elsevier
Today's software systems communicate over the Internet using standard protocols that have
been heavily scrutinized, providing some assurance of resistance to malicious attacks and …