In this paper we propose a new resource discovery protocol, REALTOR, which is based on a combination of pullbased and push-based resource information dissemination. REALTOR has be...
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...