enter search term and/or author name
Modeling key compromise impersonation attacks on group key exchange protocols
M. C. Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
Article No.: 28
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols....
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
M. Ho Au, P. P. Tsang, A. Kapadia
Article No.: 29
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing (or linking) users'...
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other...
Privacy-preserving distributed network troubleshooting—bridging the gap between theory and practice
Martin Burkhart, Xenofontas Dimitropoulos
Article No.: 31
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use...
Server-side verification of client behavior in online games
Darrell Bethea, Robert A. Cochran, Michael K. Reiter
Article No.: 32
Online gaming is a lucrative and growing industry but one that is slowed by cheating that compromises the gaming experience and hence drives away players (and revenue). In this paper we develop a technique by which game developers can enable game...