Sciweavers

99
Voted
HOST
2008
IEEE
15 years 19 days ago
The Butterfly PUF: Protecting IP on every FPGA
Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert...
ISI
2008
Springer
15 years 14 days ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
CCS
2008
ACM
15 years 2 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 6 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
122
Voted
PST
2008
15 years 1 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
Security Privacy
Top of PageReset Settings