Toward Inherently Secure and Resilient Societies
نویسندگان
چکیده
منابع مشابه
Toward inherently secure and resilient societies.
Recent years have seen a number of challenges to social stability and order, ranging from terrorist attacks and natural disasters to epidemics such as AIDS and SARS. Such challenges have generated specific policy responses, such as enhanced security at transportation hubs and planned deployment of a global tsunami detection network. However, the range of challenges and the practical impossibili...
متن کاملIntrusion-Resilient Secure Channels
We propose a new secure communication primitive called an Intrusion-Resilient Channel (IRC) that limits the damage resulting from key exposures and facilitates recovery. We define security against passive but mobile and highly adaptive adversaries capable of exposing even expired past secrets. We describe an intuitive channel construction using (as a black box) existing public key cryptosystems...
متن کاملSecure and Resilient Routing: A Framework for Resilient Network Architectures
A common paradigm for a network service architecture is to provide a number of different services or applications in which all of them share resources; the routing framework provides the best path to all services. A simple twist to this basic notion is if we were to architect in a way to virtualize the network so that different services are clustered into different virtual, adaptive partitions ...
متن کاملDesigning resilient and secure smart micro grids
The research presented in this extended abstract paper depicts a smart grid management framework which enables a decentralized and autonomous organization of the energy participants within these grids. Based on basic requirements for operating such systems, challenges and tasks are being discussed here as a basis for future research. The discussion encompasses both fields of electrical engineer...
متن کاملISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2005
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.1111534