Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
… pathways or sequences of events that an attacker might use to … It is preferable to include only
necessary packages in images … schedule is beneficial because it establishes a schedule for …

Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arXiv preprint arXiv …, 2020 - arxiv.org
… , a security team investigates the incident case and carries … and schedule analysis of
packages in dependency trees using … We use Celery [56] to schedule analyses of packages. To …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - … Security, 2021 - dl.acm.org
… is a powerful security service that allows a party to verify the … to manage and appropriately
schedule multiple concurrent tasks … the same channel the network latency as well as package

Better keep cash in your boots-hardware wallets are the new single point of failure

A Dabrowski, K Pfeffer, M Reichel, A Mai… - … Finance and Security, 2021 - dl.acm.org
… by examining their initialization procedure and attestation … use tamper-evident packaging
or holographic stickers even … Their interactive two-party protocol creates ECDSA keys in …

[HTML][HTML] … package for increasing tuberculosis notifications from private practitioners in Bandung, Indonesia (INSTEP2): A cluster-randomised controlled trial protocol

PF Hadisoemarto, BW Lestari, K Sharples… - …, 2021 - ncbi.nlm.nih.gov
… The outcome event is TB notification reported to the CHC by PPs in the selected study area.
schedule a visit to obtain written informed consent and deliver the first education session. …

Caregiver‐implemented toilet training procedures for children with autism spectrum disorder

HA Dabney, J DeVries… - Behavioral …, 2023 - Wiley Online Library
… skills via the treatment package, the protocol was modified to include a denser sit schedule
for … as completed when submitting data for each toileting event. Procedural integrity was self-…

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment

O Blazy, I Boureanu, P Lafourcade, C Onete… - 32nd USENIX Security …, 2023 - usenix.org
… approach is that we only consider twoparty protocols: as such, even if … (forwarding keys from
the same bundles), thus ensuring that it can run … We depict the key-schedule of SAID in Fig. 7…

Empowering dyads of older adults with mild cognitive impairment and their care partners using conversational agents

T Zubatiy, KL Vickers, N Mathur, ED Mynatt - Proceedings of the 2021 …, 2021 - dl.acm.org
Reminders were used 27% of the time, and alarms … GHH to schedule a medication alarm or
calendar event to remind … For one care partner, even getting packages in the mail prompted …

Cryptographic security of the MLS rfc, draft 11

C Brzuska, E Cornelissen, K Kohbrok - Cryptology ePrint Archive, 2021 - eprint.iacr.org
… We develop security models for TreeKEM, the key schedule … We now explain how to use
KEY packages to model security. … the key schedule in epoch of any group and of any party and …

Server-aided continuous group key agreement

J Alwen, D Hartmann, E Kiltz, M Mularczyk - … Communications Security, 2022 - dl.acm.org
… the epoch key into a complete key schedule which in turn can be … generated key package of
any user is always available. … created by an honest party using good randomness. Moreover, …