PA-SET: Privacy-aware SET protocol

Author(s):  
Ayman Abdel-Hamid ◽  
Ossama Badawy ◽  
Shreif Bahaa
Keyword(s):  
2017 ◽  
Vol 58 (1) ◽  
pp. 65-72 ◽  
Author(s):  
Gustavo A. Callegari ◽  
Jefferson S. Novaes ◽  
Gabriel R. Neto ◽  
Ingrid Dias ◽  
Nuno D. Garrido ◽  
...  

AbstractThe aim of this study was to investigate the responses of creatine kinase (CK) and lactate dehydrogenase (LDH) after performing different resistance and aerobic exercise protocols. Twelve recreationally trained men (age, 23.2 ± 5.6 years; body mass, 84.3 ± 9.3 kg; body height, 178.9 ± 4.5 cm; and BMI, 26.3 ± 2.3 kg·m2) volunteered to participate in this study. All subjects were randomly assigned to four experimental protocols (crossover): (a) aerobic training at 60% of VO2max, (b) aerobic training at 80% of VO2max, (c) a resistance exercise (RE) session with a bi-set protocol, and (d) an RE session with a multiple sets protocol. Blood samples were collected before, immediately after and 24 hours following the experimental protocols. After 24 hours, there was a significant increase in CK for the 80% of VO2max protocol vs. the bi-set RE session (p = 0.016). Immediately after the protocols, we observed a significant increase in LDH among certain groups compared to others, as follows: multiple sets RE session vs. 60% of VO2max, bi-set RE session vs. 60% of VO2max, multiple sets RE session vs. 80% of VO2max, and bi-set RE session vs. 80% of VO2max (p = 0.008, p = 0.013; p = 0.002, p = 0.004, respectively). In conclusion, aerobic exercise performed at 80% of VO2max appears to elevate plasma CK levels more than bi-set RE sessions. However, the bi-set and multiple sets RE sessions appeared to trigger greater levels of blood LDH compared to aerobic protocols performed at 60% and 80% of VO2max.


2017 ◽  
Vol 6 (1) ◽  
pp. 13
Author(s):  
Hasan Al-Refai ◽  
Khaldoun Batiha

Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, since there are areas, which require further study such as: E-payment phase in SET protocol.E-payment phase is vast and complex phase it has long series of steps. The behavior of environment is assumed by the phase and is restricted to the rules built by their proposed protocol. This paper will follow Ph-Spi calculus for formalizing and analyzing enhanced payment phase of SET protocol by reducing the number of transactions with many additional operators.A new agent controller will be formally modeled, which we can rely upon to make automated decisions during interaction with a dynamic protocol environment. So, this agent controller is used to terminate the transaction process in any case of fraud or attack. This paper is conjunction between our previous works of E-payment phase in SET protocol and other works in Ph-Spi calculus in purpose of analyzing and proving the main security properties: authentication and privacy to evaluate the efficiency of the enhanced security of electronic payment phase for SET protocol (E-SET) using Ph-Spi calculus.


2011 ◽  
Vol 6 (7) ◽  
pp. 22-28
Author(s):  
Xunyi Ren ◽  
Lili Wei ◽  
Junfeng Zhang ◽  
Xiaodong Ma
Keyword(s):  

2019 ◽  
Vol 40 (Supplement_1) ◽  
pp. S127-S128
Author(s):  
H Belacic ◽  
M Mondozzi ◽  
J Crow ◽  
K Culp ◽  
C Sadie ◽  
...  

2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Hanane Houmani ◽  
Mohamed Mejri

Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.


Sign in / Sign up

Export Citation Format

Share Document