— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...