Sciweavers

Share
9 search results - page 1 / 2
» SN2K Attacks and Honest Services
Sort
View
COMPSAC
2009
IEEE
10 years 6 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
IPL
2016
47views more  IPL 2016»
4 years 7 months ago
A Denial of Service attack against fair computations using Bitcoin deposits
Bitcoin supports complex transactions where the recipient of a transaction can be programmatically determined. Using these transactions, multiparty computation protocols that aim ...
Jethro G. Beekman
MOBIHOC
2007
ACM
10 years 11 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
ICALP
2004
Springer
10 years 5 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
IACR
2016
40views Biometrics» more  IACR 2016»
4 years 7 months ago
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a...
Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao
books