Skip to main content

Showing 1–11 of 11 results for author: Pricop, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.01889  [pdf, other

    cs.CR

    FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7

    Authors: Ridha Ghayoula, Jaouhar Fattahi, Amor Smida, Issam El Gmati, Emil Pricop, Marwa Ziadia

    Abstract: FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implemen… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

    Comments: ECAI 2022

  2. Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

    Authors: Emil Pricop, Sanda Florentina Mihalache

    Abstract: Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, i… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: 6 pages; Paper accepted and presented at ECAI 2015 - 7th International Conference Electronics, Computers and Artificial Intelligence, 25 June -27 June, 2015, Bucharest, ROMÂNIA

  3. On the design of an innovative solution for increasing hazardous materials transportation safety

    Authors: Emil Pricop

    Abstract: Transportation of hazardous materials represent a high risk operation all over the world. Flammable substances such as oil, kerosene, hydrocarbons, ammonium nitrate or toxic products are shipped every day on busy roads by trucks. An innovative solution for increasing hazardous materials transportation safety is presented in this paper. The solution integrates three systems: one mounted on the truc… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: Paper presented at the 17th International Conference on System Theory, Control and Computing (ICSTCC 2013), Sinaia, Romania - 11-13 October 2013

    Journal ref: Proceedings of the 7th International Conference on System Theory, Control and Computing (ICSTCC 2013)

  4. Real-time stock analysis for blending recipes in industrial plants

    Authors: Florin Zamfir, Nicolae Paraschiv, Emil Pricop

    Abstract: Many companies use Excel spreadsheets to keep stock records and to calculate process-specific data. These spreadsheets are often hard to understand and track. And if the user does not protect them, there is a risk that the user randomly changes or erase formulas. The paper focuses on the stocks of products used in a blending process with a known recipe. Developing an application that can bring thi… ▽ More

    Submitted 29 August, 2019; originally announced September 2019.

    Comments: Accepted for presentation at 23rd International Conference on System Theory, Control and Computing (ICSTCC 2019), October 9-11, 2019, Sinaia, Romania

  5. IoT Forensic -- A digital investigation framework for IoT systems

    Authors: Snehal Sathwara, Nitul Dutta, Emil Pricop

    Abstract: Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the IoT poses many challenges for forensics investigators. These include the wide range and variety of information, the unclear lines of differentiatio… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: Paper presented at 10th International Conference on Electronics, Computers and Artificial Intelligence, , ECAI 2018 - 28-30 June 2018 - Iasi, Romania

    Journal ref: 018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 2018, pp. 1-4

  6. Authentication by Witness Functions

    Authors: Jaouhar Fattahi, Mohamed Mejri, Emil Pricop

    Abstract: Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.

    Submitted 13 March, 2019; originally announced March 2019.

    Comments: Published in: 2016 IEEE Trustcom/BigDataSE/ISPA

    Journal ref: Trustcom/BigDataSE/ISPA 2016: 1990-1997

  7. On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions

    Authors: Jaouhar Fattahi, Mohamed Mejri, Emil Pricop

    Abstract: In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some category of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions. We show how it helps to teach about a security vulnerability in a given step of this protocol where the value of security of a particul… ▽ More

    Submitted 1 March, 2019; originally announced March 2019.

    Comments: Accepted at the 2019 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE) on March 1, 2019

  8. Considerations regarding security issues impact on systems availability

    Authors: Emil Pricop, Sanda Florentina Mihalache, Nicolae Paraschiv, Jaouhar Fattahi, Florin Zamfir

    Abstract: Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

    Comments: Paper accepted for 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016) Proceedings, Ploiesti, Romania

    Journal ref: 2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)

  9. Radiation Pattern Synthesis Using Hybrid Fourier- Woodward-Lawson-Neural Networks for Reliable MIMO Antenna Systems

    Authors: Elies Ghayoula, Ridha Ghayoula, Jaouhar Fattahi, Emil Pricop, Jean-Yves Chouinard, Ammar Bouallegue

    Abstract: In this paper, we implement hybrid Woodward-Lawson-Neural Networks and weighted Fourier method to synthesize antenna arrays. The neural networks (NN) is applied here to simplify the modeling of MIMO antenna arrays by assessing phases. The main problem is obviously to find optimal weights of the linear antenna array elements giving radiation pattern with minimum sidelobe level (SLL) and hence ameli… ▽ More

    Submitted 7 October, 2017; originally announced October 2017.

    Comments: Accepted at the IEEE SMC 2017

  10. Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?

    Authors: Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop

    Abstract: Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: Accepted at the IEEE SMC (6 two column pages) on 2017-07-10

  11. Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context

    Authors: Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Ouejdene Samoud, Elies Ghayoula, Emil Pricop

    Abstract: In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the… ▽ More

    Submitted 27 July, 2017; v1 submitted 24 July, 2017; originally announced July 2017.

    Comments: Accepted at the IEEE SMC'2017 on 2017-07-10 (6 double column pages)