Skip to main content

Showing 1–9 of 9 results for author: Portnoi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1510.08007  [pdf

    cs.CR

    Location-Enhanced Authenticated Key Exchange

    Authors: Marcos Portnoi, Chien-Chung Shen

    Abstract: We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication factors. LOCATHE contributes to: (1) forward secrecy… ▽ More

    Submitted 17 February, 2016; v1 submitted 27 October, 2015; originally announced October 2015.

    Comments: This is an extended version of 2016 International Conference on Computing, Networking and Communications (ICNC 2016), Workshop on Computing, Networking and Communications (CNC), 2016, pp. 201-205

  2. arXiv:1505.05135  [pdf

    cs.PF

    Network Simulator - Visão Geral da Ferramenta de Simulação de Redes

    Authors: Marcos Portnoi, Rafael Gonçalves Bezerra de Araújo

    Abstract: This paper describes NS - Network Simulator, the computer networks simulation tool. We offer an overview NS, and also analyze its characteristics and functions. Finally, we present in detail all steps for preparing a simulation of a simple model in NS.

    Submitted 27 April, 2015; originally announced May 2015.

    Comments: in Portuguese, Seminário Estudantil de Produção Acadêmica, 2002

  3. Secure Zones: An Attribute-Based Encryption advisory system for safe firearms

    Authors: Marcos Portnoi, Chien-Chung Shen

    Abstract: This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the user and the firearm are received by embedded hardware in the firearms, which then advises the user about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the polic… ▽ More

    Submitted 27 April, 2015; originally announced April 2015.

    Comments: Communications and Network Security (CNS), 2013 IEEE Conference on. arXiv admin note: substantial text overlap with arXiv:1411.1733

  4. Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons

    Authors: Marcos Portnoi, Chien-Chung Shen

    Abstract: This work presents a mobile sign-on scheme, which utilizes Bluetooth Low Energy beacons for location awareness and Attribute-Based Encryption for expressive, broadcast-style key exchange. Bluetooth Low Energy beacons broadcast encrypted messages with encoded access policies. Within range of the beacons, a user with appropriate attributes is able to decrypt the broadcast message and obtain paramete… ▽ More

    Submitted 27 April, 2015; originally announced April 2015.

    Comments: Communications and Network Security (CNS), 2013 IEEE Conference on. arXiv admin note: text overlap with arXiv:1410.0983

  5. An information services algorithm to heuristically summarize IP addresses for a distributed, hierarchical directory service

    Authors: Marcos Portnoi, Jason Zurawsky, Martin Swany

    Abstract: A distributed, hierarchical information service for computer networks might rely in several instances, located in different layers. A distributed directory service, for example, might be comprised of upper level listings, and local directories. The upper level listings contain a compact version of the local directories. Clients desiring to access the information contained in local directories migh… ▽ More

    Submitted 7 January, 2015; v1 submitted 31 December, 2014; originally announced January 2015.

    Comments: Grid Computing (GRID), 2010 11th IEEE/ACM International Conference on, 25-28 Oct. 2010

  6. arXiv:1411.1733  [pdf

    cs.CR

    Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    Authors: Marcos Portnoi, Chien-Chung Shen

    Abstract: This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Enc… ▽ More

    Submitted 6 November, 2014; originally announced November 2014.

  7. Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption

    Authors: Marcos Portnoi, Chien-Chung Shen

    Abstract: Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords. Two-factor authentication aids in the security, even though, as a side effect, might worsen user experience. We depict a mobile sign-on scheme that benefits from the dynamic relationship between a use… ▽ More

    Submitted 7 October, 2014; v1 submitted 3 October, 2014; originally announced October 2014.

    Comments: Accepted at International Conference on Computing, Networking and Communications (ICNC 2015)

  8. arXiv:1401.7034  [pdf

    cs.NI

    TARVOS - an Event-Based Simulator for Performance Analysis, Supporting MPLS, RSVP-TE, and Fast Recovery

    Authors: Marcos Portnoi, Joberto S. B. Martins

    Abstract: This paper presents a new discrete event-based network simulator named TARVOS - Computer Networks Simulator, being designed as part of the first Author's Masters research and will provide support to simulating MPLS architecture, several RSVP-TE protocol functionalities and fast recovery in case of link failure. The tool is used in a case study, where the impact of a link failure on a VoIP applicat… ▽ More

    Submitted 27 January, 2014; originally announced January 2014.

    Comments: XIII Brazilian Symposium on Multimedia and the Web - Webmedia 2007, Oct. 20-24, 2007, Gramado, RS, Brazil, vol. 1, p. 222-229

    Journal ref: XIII Brazilian Symposium on Multimedia and the Web - Webmedia 2007, Oct. 20-24, 2007, Gramado, RS, Brazil, vol. 1, p. 222-229

  9. arXiv:1401.6988  [pdf

    cs.CR

    Criptografia com Curvas Elípticas

    Authors: Marcos Portnoi

    Abstract: This paper presents an overview of the use of elliptic curves in cryptography. The security of this cryptosystem is based on the discrete logarithm problem, which appears to be much harder compared to the discrete logarithm problem in other cryptosystems. An overview of common cryptosystems is given, such as Diffie-Hellman and RSA, and an elliptic curve cryptography scheme is discussed. --------… ▽ More

    Submitted 27 January, 2014; originally announced January 2014.

    Comments: Portuguese, 14 pages