Skip to main content

Showing 1–12 of 12 results for author: Vigneri, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.08627  [pdf, other

    cs.NI

    Managing Write Access without Token Fees in Leaderless DAG-based Ledgers

    Authors: Darcy Camargo, Luigi Vigneri, Andrew Cullen

    Abstract: A significant portion of research on distributed ledgers has focused on circumventing the limitations of leader-based blockchains mainly in terms of scalability, decentralization and power consumption. Leaderless architectures based on directed acyclic graphs (DAGs) avoid many of these limitations altogether, but their increased flexibility and performance comes at the cost of increased design com… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: Short version awarded with the Best Paper Award at BLOCKCHAIN Congress 2023

  2. arXiv:2203.12076  [pdf, other

    cs.DC

    Improving Quality of Service for Users of DAG-based Distributed Ledgers

    Authors: Andrew Cullen, Lianna Zhao, Luigi Vigneri, Robert Shorten

    Abstract: An outstanding problem in the design of distributed ledgers concerns policies that govern the manner in which users interact with the network. Network usability is crucial to the mainstream adoption of distributed ledgers, particularly for enterprise applications in which most users do not wish to operate full node. For DAG-based ledgers such as IOTA, we propose a user-node interaction mechanism t… ▽ More

    Submitted 14 July, 2023; v1 submitted 22 March, 2022; originally announced March 2022.

  3. arXiv:2107.10238  [pdf, other

    cs.CR

    Secure Access Control for DAG-based Distributed Ledgers

    Authors: Lianna Zhao, Luigi Vigneri, Andrew Cullen, William Sanders, Pietro Ferraro, Robert Shorten

    Abstract: Access control is a fundamental component of the design of distributed ledgers, influencing many aspects of their design, such as fairness, efficiency, traditional notions of network security, and adversarial attacks such as Denial-of-Service (DoS) attacks. In this work, we consider the security of a recently proposed access control protocol for Directed Acyclic Graph-based distributed ledgers. We… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: Submitted for consideration for publication in IEEE IoT Journal

  4. Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions

    Authors: Vidal Attias, Luigi Vigneri, Vassil Dimitrov

    Abstract: Permissionless distributed ledgers provide a promising approach to deal with the Internet of Things (IoT) paradigm. Since IoT devices mostly generate data transactions and micropayments, distributed ledgers that use fees to regulate the network access are not an optimal choice. In this paper, we study a feeless architecture developed by IOTA and designed specifically for the IoT. Due to the lack o… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Journal ref: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 1-6

  5. arXiv:2005.07778  [pdf, other

    cs.NI cs.DB

    Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach

    Authors: Andrew Cullen, Pietro Ferraro, William Sanders, Luigi Vigneri, Robert Shorten

    Abstract: In the Internet of Things (IoT) domain, devices need a platform to transact seamlessly without a trusted intermediary. Although Distributed Ledger Technologies (DLTs) could provide such a platform, blockchains, such as Bitcoin, were not designed with IoT networks in mind, hence are often unsuitable for such applications: they offer poor transaction throughput and confirmation times, put stress on… ▽ More

    Submitted 14 July, 2021; v1 submitted 15 May, 2020; originally announced May 2020.

  6. Fast Generation of RSA Keys using Smooth Integers

    Authors: Vassil Dimitrov, Luigi Vigneri, Vidal Attias

    Abstract: Primality generation is the cornerstone of several essential cryptographic systems. The problem has been a subject of deep investigations, but there is still a substantial room for improvements. Typically, the algorithms used have two parts trial divisions aimed at eliminating numbers with small prime factors and primality tests based on an easy-to-compute statement that is valid for primes and in… ▽ More

    Submitted 13 July, 2021; v1 submitted 24 December, 2019; originally announced December 2019.

    Comments: This paper contains 11 pages and 8 tables, in IEEE Transactions on Computers

  7. arXiv:1912.11401  [pdf, ps, other

    cs.CR cs.DC

    On the Decentralized Generation of theRSA Moduli in Multi-Party Settings

    Authors: Vidal Attias, Luigi Vigneri, Vassil Dimitrov

    Abstract: RSA cryptography is still widely used. Some of its applications (e.g., distributed signature schemes, cryptosystems) do not allow the RSA modulus to be generated by a centralized trusted entity. Instead, the factorization must remain unknown to all the network participants. To this date, the existing algorithms are either computationally expensive, or limited to two-party settings. In this work, w… ▽ More

    Submitted 24 December, 2019; originally announced December 2019.

    Comments: The submission contains 14 pages and 12 figures. The conference to submit is not determined yet

  8. arXiv:1904.09849  [pdf, other

    cs.NI

    Learning to Cache With No Regrets

    Authors: Georgios S. Paschos, Apostolos Destounis, Luigi Vigneri, George Iosifidis

    Abstract: This paper introduces a novel caching analysis that, contrary to prior work, makes no modeling assumptions for the file request sequence. We cast the caching problem in the framework of Online Linear Optimization (OLO), and introduce a class of minimum regret caching policies, which minimize the losses with respect to the best static configuration in hindsight when the request model is unknown. Th… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: IEEE INFOCOM 2019

  9. arXiv:1805.12090  [pdf, other

    cs.AI cs.NI

    Problem-Adapted Artificial Intelligence for Online Network Optimization

    Authors: Spyridon Vassilaras, Luigi Vigneri, Nikolaos Liakopoulos, Georgios S. Paschos, Apostolos Destounis, Thrasyvoulos Spyropoulos, Merouane Debbah

    Abstract: Future 5G wireless networks will rely on agile and automated network management, where the usage of diverse resources must be jointly optimized with surgical accuracy. A number of key wireless network functionalities (e.g., traffic steering, power control) give rise to hard optimization problems. What is more, high spatio-temporal traffic variability coupled with the need to satisfy strict per sli… ▽ More

    Submitted 26 March, 2019; v1 submitted 30 May, 2018; originally announced May 2018.

  10. arXiv:1702.04943  [pdf, ps, other

    cs.NI

    Femto-Caching with Soft Cache Hits: Improving Performance through Recommendation and Delivery of Related Content

    Authors: Pavlos Sermpezis, Thrasyvoulos Spyropoulos, Luigi Vigneri, Theodoros Giannakas

    Abstract: Pushing popular content to cheap "helper" nodes (e.g., small cells) during off-peak hours has recently been proposed to cope with the increase in mobile data traffic. User requests can be served locally from these helper nodes, if the requested content is available in at least one of the nearby helpers. Nevertheless, the collective storage of a few nearby helper nodes does not usually suffice to a… ▽ More

    Submitted 16 February, 2017; originally announced February 2017.

  11. arXiv:1504.06093  [pdf, other

    cs.NI cs.CY

    Taming the Android AppStore: Lightweight Characterization of Android Applications

    Authors: Luigi Vigneri, Jaideep Chandrashekar, Ioannis Pefkianakis, Olivier Heen

    Abstract: There are over 1.2 million applications on the Google Play store today with a large number of competing applications for any given use or function. This creates challenges for users in selecting the right application. Moreover, some of the applications being of dubious origin, there are no mechanisms for users to understand who the applications are talking to, and to what extent. In our work, we f… ▽ More

    Submitted 27 April, 2015; v1 submitted 23 April, 2015; originally announced April 2015.

    Comments: 20 pages, single column

    Report number: RR-15-305

  12. arXiv:1503.00648  [pdf, ps, other

    cs.NI

    Offloading on the Edge: Analysis and Optimization of Local Data Storage and Offloading in HetNets

    Authors: Pavlos Sermpezis, Luigi Vigneri, Thrasyvoulos Spyropoulos

    Abstract: The rapid increase in data traffic demand has overloaded existing cellular networks. Planned upgrades in the communication architecture (e.g. LTE), while helpful, are not expected to suffice to keep up with demand. As a result, extensive densification through small cells, caching content closer to or even at the device, and device-to-device (D2D) communications are seen as necessary components for… ▽ More

    Submitted 2 March, 2015; originally announced March 2015.