ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 14 Issue 4, December 2011

Modeling key compromise impersonation attacks on group key exchange protocols
M. C. Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
Article No.: 28
DOI: 10.1145/2043628.2043629

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols....

PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
M. Ho Au, P. P. Tsang, A. Kapadia
Article No.: 29
DOI: 10.1145/2043628.2043630

Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing (or linking) users'...

On two RFID privacy notions and their relations
Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma
Article No.: 30
DOI: 10.1145/2043628.2043631

Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other...

Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
Martin Burkhart, Xenofontas Dimitropoulos
Article No.: 31
DOI: 10.1145/2043628.2043632

Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use...

Server-side verification of client behavior in online games
Darrell Bethea, Robert A. Cochran, Michael K. Reiter
Article No.: 32
DOI: 10.1145/2043628.2043633

Online gaming is a lucrative and growing industry but one that is slowed by cheating that compromises the gaming experience and hence drives away players (and revenue). In this paper we develop a technique by which game developers can enable game...