enter search term and/or author name
The predecessor attack: An analysis of a threat to anonymous communications systems
Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields
There have been a number of protocols proposed for anonymous network communication. In this paper, we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator...
A key-chain-based keying scheme for many-to-many secure group communication
Dijiang Huang, Deep Medhi
We propose a novel secure group keying scheme using hash chain for many-to-many secure group communication. This scheme requires a key predistribution center to generate multiple hash chains and allocates exactly one hash value...
Client-side caching for TLS
Hovav Shacham, Dan Boneh, Eric Rescorla
We propose two new mechanisms for caching handshake information on TLS clients. The "fast-track" mechanism provides a client-side cache of a server's public parameters and negotiated parameters in the course of an initial, enabling handshake. These...
Traducement: A model for record security
Tom Walcott, Matt Bishop
Security models generally incorporate elements of both confidentiality and integrity. We examine a case where confidentiality is irrelevant to the process being modeled. In this case, integrity includes not only the authentication of origin and the...
Hypothesizing and reasoning about attacks missed by intrusion detection systems
Peng Ning, Dingbang Xu
Several alert correlation methods have been proposed over the past several years to construct high-level attack scenarios from low-level intrusion alerts reported by intrusion detection systems (IDSs). However, all of these methods depend heavily on...