Sciweavers

95 search results - page 19 / 19
» Privacy is Not an Option: Attacking the IPv6 Privacy Extensi...
Sort
View
113
Voted
CCS
2008
ACM
15 years 8 days ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
159
Voted
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 10 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
87
Voted
CCS
2009
ACM
15 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
154
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
INFOCOM
2011
IEEE
14 years 1 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu