Skip to main content

Showing 1–9 of 9 results for author: Olimid, R F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17371  [pdf, ps, other

    cs.CR cs.NI

    Secret Sharing in 5G-MEC: Applicability for joint Security and Dependability

    Authors: Thilina Pathirana, Ruxandra F. Olimid

    Abstract: Multi-access Edge Computing (MEC), an enhancement of 5G, processes data closer to its generation point, reducing latency and network load. However, the distributed and edge-based nature of 5G-MEC presents privacy and security challenges, including data exposure risks. Ensuring efficient manipulation and security of sensitive data at the edge is crucial. To address these challenges, we investigate… ▽ More

    Submitted 20 June, 2025; originally announced June 2025.

    Comments: 10 pages, 5 figures, Accepted to the proceedings of 22nd International Conference on Privacy, Security, and Trust (PST2025)

  2. arXiv:2506.10721  [pdf, ps, other

    cs.CR

    Commitment Schemes for Multi-Party Computation

    Authors: Ioan Ionescu, Ruxandra F. Olimid

    Abstract: The paper presents an analysis of Commitment Schemes (CSs) used in Multi-Party Computation (MPC) protocols. While the individual properties of CSs and the guarantees offered by MPC have been widely studied in isolation, their interrelation in concrete protocols and applications remains mostly underexplored. This paper presents the relation between the two, with an emphasis on (security) properties… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  3. arXiv:2412.13865  [pdf

    cs.CR cs.ET

    Towards an identity management solution on Arweave

    Authors: Andreea Elena Dragnoiu, Ruxandra F. Olimid

    Abstract: Traditional identity management systems, often centralized, face challenges around privacy, data security, and user control, leaving users vulnerable to data breaches and misuse. This paper explores the potential of using the Arweave network to develop an identity management solution. By harnessing Arweave's permanent storage, our solution offers the users a Self-Sovereign Identity (SSI) framework… ▽ More

    Submitted 20 December, 2024; v1 submitted 18 December, 2024; originally announced December 2024.

    Comments: 37 pages

  4. arXiv:2406.17554  [pdf, other

    cs.NI

    Security-Aware Availability Modeling of a 5G-MEC System

    Authors: Thilina Pathirana, Gianfranco Nencioni, Ruxandra F. Olimid

    Abstract: Multi-access Edge Computing (MEC) is an essential technology for the fifth generation (5G) of mobile networks. MEC enables low-latency services by bringing computing resources close to the end-users. The integration of 5G and MEC technologies provides a favorable platform for a wide range of applications, including various mission-critical applications, such as smart grids, industrial internet, an… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: 18 pages, 11 figures

  5. arXiv:2111.04801  [pdf, other

    cs.CR cs.NI

    Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing

    Authors: Marian Gusatu, Ruxandra F. Olimid

    Abstract: Multi-access Edge Computing (MEC) is a 5G-enabling solution that aims to bring cloud-computing capabilities closer to the end-users. This paper focuses on mitigation techniques against Distributed Denial-of-Service (DDoS) attacks in the context of 5G MEC, providing solutions that involve the virtualized environment and the management entities from the MEC architecture. The proposed solutions aim t… ▽ More

    Submitted 10 November, 2021; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: 10 pages, 5 figures, in review at SECITC: http://secitc.eu/

  6. 5G Multi-access Edge Computing: a Survey on Security, Dependability, and Performance

    Authors: Gianfranco Nencioni, Rosario G. Garroppo, Ruxandra F. Olimid

    Abstract: The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter requirements. Multi-access Edge Computing (MEC) is a key technology that enables these new services by deploying multiple devices with computing and storage capabilities at the edge of the network, close to end-users. MEC enhances network efficiency by reducing latency, enabling real-time awareness of the l… ▽ More

    Submitted 4 July, 2023; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: 39 pages, 12 figures, 15 tables. This paper is published at IEEE Access (https://ieeexplore.ieee.org/document/10158694)

    Journal ref: IEEE Access, vol. 11, pp. 63496-63533, 2023

  7. arXiv:2004.13107  [pdf

    cs.CR

    Identity Management on Blockchain -- Privacy and Security Aspects

    Authors: Andreea-Elena Panait, Ruxandra F. Olimid, Alin Stefanescu

    Abstract: In the last years, identity management solutions on blockchain were proposed as a possible solution to the digital identity management problem. However, they are still at an early stage and further research needs to be done to conclude whether identity systems could benefit from the use of blockchain or not. Motivated by this, we investigate identity management solutions on blockchain intending to… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: extended version of "Identity Management on Blockchain - Privacy and Security Aspects" available at https://acad.ro/sectii2002/proceedings/doc2020-1/06-Panait.pdf

  8. arXiv:1807.11350  [pdf, other

    cs.CR

    Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

    Authors: Christian Sørseth, Xianyu Shelley Zhou, Stig F. Mjølsnes, Ruxandra F. Olimid

    Abstract: Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes vulnerabilities that attackers can exploit. This might be the case of paging messages, wake-up notifications that target specific subscribers, and that are broadcasted in clear over the… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

  9. arXiv:1702.04434  [pdf, other

    cs.CR

    Easy 4G/LTE IMSI Catchers for Non-Programmers

    Authors: Stig F. Mjølsnes, Ruxandra F. Olimid

    Abstract: IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. Recently, we verified that IMSI Catcher attacks are really practical for the state-of-the-art 4G/LTE mobile systems too. Our IMSI Catcher device acquires subscription identities… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.