enter search term and/or author name
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate
Roberto Di Pietro, Gabriele Oligeri
Article No.: 9
Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce several contributions to jamming mitigation. In particular, we introduce a...
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport
Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar
Article No.: 10
We propose a new lightweight cryptographic payment scheme for transit systems, called P4R (Privacy-Preserving Pre-Payments with Refunds), which is suitable for low-cost user devices with limited capabilities. Using P4R, users deposit money to...
The National Vulnerability Database (NVD) maintained by the US National Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well as any patches available to address these...
A Visualizable Evidence-Driven Approach for Authorship Attribution
Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi
Article No.: 12
The Internet provides an ideal anonymous channel for concealing computer-mediated malicious activities, as the network-based origins of critical electronic textual evidence (e.g., emails, blogs, forum posts, chat logs, etc.) can be easily...