enter search term and/or author name
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs
Jooyoung Lee, Douglas R. Stinson
Article No.: 1
In this paper, we discuss the use of combinatorial set systems (combinatorial designs) in the design of key predistribution schemes (KPSs) for sensor networks. We show that the performance of a KPS can be improved by carefully choosing a certain...
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning
Chad D. Mano, Andrew Blaich, Qi Liao, Yingxin Jiang, David A. Cieslak, David C. Salyers, Aaron Striegel
Article No.: 2
Wireless network access has become an integral part of computing both at home and at the workplace. The convenience of wireless network access at work may be extremely beneficial to employees, but can be a burden to network security personnel....
Passive-Logging Attacks Against Anonymous Communications Systems
Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields
Article No.: 3
Using analysis, simulation, and experimentation, we examine the threat against anonymous communications posed by passive-logging attacks. In previous work, we analyzed the success of such attacks under various assumptions. Here, we evaluate the...
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
Article No.: 4
A timed-release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it only after a specified time. We formalize the concept of a secure timed-release public-key cryptosystem and show that, if a third...
Verifying Completeness of Relational Query Answers from Online Servers
Hweehwa Pang, Kian-Lee Tan
Article No.: 5
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online servers over extended periods of time. A breached server that is not detected in time may return incorrect query answers to users....
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
Felix Brandt, Tuomas Sandholm
Article No.: 6
We investigate whether it is possible to preserve privacy in sealed-bid auctions to a maximal extent. In particular, this paper focuses on <it>unconditional full privacy</it>, i.e., privacy that relies neither on trusted third parties...