Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015

Silence is Golden: Exploiting Jamming and Radio Silence to Communicate
Roberto Di Pietro, Gabriele Oligeri
Article No.: 9
DOI: 10.1145/2699906

Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce several contributions to jamming mitigation. In particular, we introduce a...

Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport
Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar
Article No.: 10
DOI: 10.1145/2699904

We propose a new lightweight cryptographic payment scheme for transit systems, called P4R (Privacy-Preserving Pre-Payments with Refunds), which is suitable for low-cost user devices with limited capabilities. Using P4R, users deposit money to...

Pareto-Optimal Adversarial Defense of Enterprise Systems
Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian
Article No.: 11
DOI: 10.1145/2699907

The National Vulnerability Database (NVD) maintained by the US National Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well as any patches available to address these...

A Visualizable Evidence-Driven Approach for Authorship Attribution
Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi
Article No.: 12
DOI: 10.1145/2699910

The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activities, as the network-based origins of critical electronic textual evidence (e.g., emails, blogs, forum posts, chat logs, etc.) can be easily...