Filters








7,456 Hits in 6.2 sec

Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries [chapter]

David Basin, Cas Cremers
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We also introduce the concept of a protocol-security hierarchy, which classifies the relative strength of protocols against different forms of compromise.  ...  The framework's rules can be combined in different ways to specify different adversary capabilities, capturing different practically-relevant notions of key and state compromise.  ...  Securityprotocol designers are well aware of this and many protocols are designed to work in the face of various forms of corruption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-15205-4_1">doi:10.1007/978-3-642-15205-4_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jpnlzbuxyng6nh33pvmgpoleq4">fatcat:jpnlzbuxyng6nh33pvmgpoleq4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131007135452/http://people.inf.ethz.ch:80/cremersc/downloads/download.php?file=papers/BaCr2010-degrees.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/b2/85b2384b180a4f5f4c99513e7b6f2754d0aa3d08.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-15205-4_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SR3: Secure Resilient Reputation-based Routing

Karine Altisen, Stephane Devismes, Raphael Jamet, Pascal Lafourcade
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zyhr6ql53ffubizi3tzi66anja" style="color: black;">2013 IEEE International Conference on Distributed Computing in Sensor Systems</a> </i> &nbsp;
Our results show that the resiliency accomplished by SR3 is drastically better than the one achieved by those protocols, especially when the network is sparse.  ...  SR3 has a security proven by formal tool. We made simulations to show the resiliency of SR3 against various scenarios, where we mixed selective forwarding, blackhole, wormhole, and Sybil attacks.  ...  We show the average delivery rates observed in networks of size n = 200 and average degree δ = 8 that have to face 20% of compromised nodes, according to the drop rate.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dcoss.2013.33">doi:10.1109/dcoss.2013.33</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/dcoss/AltisenDJL13.html">dblp:conf/dcoss/AltisenDJL13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mjk44aq56fhixgcttbj53n2ofm">fatcat:mjk44aq56fhixgcttbj53n2ofm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725194620/https://hal.archives-ouvertes.fr/hal-01759925/file/ADJL13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/0d/b40d69a3ee4782695b461a2670e035bdde5390f7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/dcoss.2013.33"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

SR3: secure resilient reputation-based routing

Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade
<span title="2016-04-26">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wpzihu2scrb7nntl4ywanbryai" style="color: black;">Wireless networks</a> </i> &nbsp;
Our results show that the resiliency accomplished by SR3 is drastically better than the one achieved by those protocols, especially when the network is sparse.  ...  SR3 has a security proven by formal tool. We made simulations to show the resiliency of SR3 against various scenarios, where we mixed selective forwarding, blackhole, wormhole, and Sybil attacks.  ...  We show the average delivery rates observed in networks of size n = 200 and average degree δ = 8 that have to face 20% of compromised nodes, according to the drop rate.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11276-016-1273-4">doi:10.1007/s11276-016-1273-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6n4awryfrja2ndrxupqybh6uy4">fatcat:6n4awryfrja2ndrxupqybh6uy4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725194620/https://hal.archives-ouvertes.fr/hal-01759925/file/ADJL13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/0d/b40d69a3ee4782695b461a2670e035bdde5390f7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11276-016-1273-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Anonymous Broadcast [article]

Mahnush Movahedi and Jared Saia and Mahdi Zamani
<span title="2014-05-21">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The protocol tolerates up to n/6 statically-scheduled Byzantine parties that are controlled by a computationally unbounded adversary.  ...  Our protocol is provably secure against traffic analysis, does not require any trusted party, and is completely load-balanced.  ...  Collisions reduce the level of anonymity our protocol guarantees because the higher the probability of collisions, the higher the chance the adversary is given in guessing the correct sequence of inputs  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.5326v1">arXiv:1405.5326v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/22npksye7vaqlg72ipshrmc2eu">fatcat:22npksye7vaqlg72ipshrmc2eu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826193455/https://arxiv.org/pdf/1405.5326v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/09/a009c2ebc5488f4a74c3ca17cbc44ede747c703d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.5326v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secure Multiparty Computation [chapter]

Carlisle Adams, Mark Stephens, Ernst M. Gabidulin, Dan Boneh, Mike Just, Claudio A. Ardagna, Ernesto Damiani, Caroline Fontaine, Paul England, Ali Bagherzandi, Bijit Hore, Sharad Mehrotra (+126 others)
<span title="">2011</span> <i title="Springer US"> Encyclopedia of Cryptography and Security </i> &nbsp;
In this paper, we will make a brief introduction to secure multiparty computation and secret sharing schemes, and discuss the multiparty computation protocol of semi-honest adversary case in detail.  ...  One way to achieve this requirement is to implement the secure multiparty computation protocols.  ...  Secure Multiparty Computation is a protocol to evaluate function F in such a secure way that both the maximum privacy of inputs is preserved and the correctness of the outputs is guaranteed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-5906-5_1332">doi:10.1007/978-1-4419-5906-5_1332</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s6noerdcunhprhweqlq7inhn4m">fatcat:s6noerdcunhprhweqlq7inhn4m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218084026/http://pdfs.semanticscholar.org/0a73/b27807dd16a51cf10763f0721513aea3dac3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/73/0a73b27807dd16a51cf10763f0721513aea3dac3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-5906-5_1332"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Securing ad hoc networks

Lidong Zhou, Z.J. Haas
<span title="">1999</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dj5kgyxcuzdmhaxvx5dcvfmvce" style="color: black;">IEEE Network</a> </i> &nbsp;
One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats an ad hoc network faces and the security goals to be achieved.  ...  On the nctwork Iaycr, an adversary could disrupt the routing protocol and disconncct the nctwork. On the highcr layers, an adversary could bring down high-lcvcl serviccs.  ...  We are also grateful to Ulfar Erlingsson and the anonymous reviewers for their comments aiid suggestions that hclped to improve the quality of the article.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/65.806983">doi:10.1109/65.806983</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3bf5zlcos5fifaq2ugtxgf3reu">fatcat:3bf5zlcos5fifaq2ugtxgf3reu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100627220333/http://people.ece.cornell.edu/haas/Publications/NM-zhou-haas-1999-11+12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/f3/08f3802f76acfdebb30d476d04fa917cfe5d780b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/65.806983"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Modern View on Forward Security

Colin Boyd, Kai Gellert
<span title="2020-08-24">2020</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past.  ...  Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities.  ...  Acknowledgments Research Council of Norway (248166 to C.B.); German Research Foundation (DFG) (JA 2445/2-1 to K.G.).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104">doi:10.1093/comjnl/bxaa104</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4rmqca3iabh2plsmjif7ai25je">fatcat:4rmqca3iabh2plsmjif7ai25je</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715054041/https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/2730309/bxaa104.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/3e/d73e6aa61d5030cb7011b2f747c60d00f300e9b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxaa104"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

TrickleDNS: Bootstrapping DNS security using social trust

Sriram Sankararaman, Jay Chen, Lakshminarayanan Subramanian, Venugopalan Ramasubramanian
<span title="">2012</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ng2h37kx3faslgosryo3ewwq6a" style="color: black;">2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</a> </i> &nbsp;
The SNN allows nameservers in the network to reliably broadcast their public-keys to each other without relying on a centralized PKI.  ...  Unlike prior solutions, which depend on the complete deployment of DNSSEC standard to preserve data integrity, TrickleDNS offers an incrementally deployable solution with a probabilistic guarantee on data  ...  Second, the reliable communication protocol for disseminating public keys is resilient in the face of upto O(n/ log n) adversarial nodes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comsnets.2012.6151334">doi:10.1109/comsnets.2012.6151334</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/comsnets/SankararamanCSR12.html">dblp:conf/comsnets/SankararamanCSR12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pycg23seojfjvababq5ndmqrwe">fatcat:pycg23seojfjvababq5ndmqrwe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151014065647/http://cs.nyu.edu:80/~jchen/publications/trickledns.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/30/5c30638a926a0cd0a28a24701988568b3fe04bea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comsnets.2012.6151334"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections [article]

Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
<span title="2018-08-22">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Liveness detection is an important defense technique to prevent such attacks, but existing solutions did not provide clear and strong security guarantees, especially in terms of time.  ...  By randomly flashing well-designed pictures on a screen and analyzing the reflected light, our protocol has leveraged physical characteristics of human faces: reflection processing at the speed of light  ...  By leveraging this substantial difference, Face Flashing thus provides effective security in terms of time. The security of the Face Flashing protocol is based on two factors: time and shape.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.01949v2">arXiv:1801.01949v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vug5rlhlzbckbbdxb6lpjyz5f4">fatcat:vug5rlhlzbckbbdxb6lpjyz5f4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928225931/https://arxiv.org/pdf/1801.01949v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/63/6d/636dbcc1a5ed8bcf5e652d9756769d9e0927a8bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1801.01949v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Security in wireless sensor networks

Venkata C. Giruka, Mukesh Singhal, James Royalty, Srilekha Varanasi
<span title="">2007</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
In this paper, we survey the state of art in securing wireless sensor networks.  ...  With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight.  ...  The paper was partially supported by the NSF Grants IIS-0242384, IIS-0324836, and CCR-0100040.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/wcm.422">doi:10.1002/wcm.422</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/en3cdj76hfaclpnezilitao6xe">fatcat:en3cdj76hfaclpnezilitao6xe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813082317/https://www2.cs.arizona.edu/classes/cs625/fall10/Survey_security_sensors.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/3b/983b3f66e3fccf2a7a61c8209ef4c19e7bdf0d80.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/wcm.422"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>

Sensor network security: a survey

Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
<span title="">2009</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
Along the way we analyze the advantages and disadvantages of current secure schemes in each category.  ...  In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first.  ...  Their protocol is based on the assumption that the number of adversary devices in the network at the time of key establishment is very small (in their results, less than 3% of the devices are adversaries  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/surv.2009.090205">doi:10.1109/surv.2009.090205</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qcm4ieoqwrdl7ezxffdsdfyk3e">fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705070730/http://gigapaper.ir/Articles/Most_Downloaded_Papers_from_all_IEEE_Journals/Communications_Surveys_amp_Tutor/Sensor_network_security_a_survey-YyC.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2b/4f/2b4fca1542ef7353606d31351adbccb1ca37cabf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/surv.2009.090205"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An end-to-end approach to secure routing in MANETs

Stephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves
<span title="">2010</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Hu et al. [2] propose the Secure Efficient Ad hoc Distance vector protocol (SEAD) as an enhancement of the Destination-Sequenced Distance-Vector (DSDV) protocol [5] for secure routing in wireless networks  ...  Because of the problems in securing distance-based routing protocols, most previous approaches to secure routing in MANETs have focused on securing entire paths from source to destination or have each  ...  Now we shall proceed to prove that the counter measures employed by SRDV can guarantee route discovery in the face of these potential attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/sec.121">doi:10.1002/sec.121</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kibi6qjppjarfnhaa2cynqt3xy">fatcat:kibi6qjppjarfnhaa2cynqt3xy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724035858/https://cloudfront.escholarship.org/dist/prd/content/qt6mx3n708/qt6mx3n708.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/8f/b78f8766308481e4bea74eaf5d6a3ff1d49cc5d0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/sec.121"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>

AnonPri: A secure anonymous private authentication protocol for RFID systems

Farzana Rahman, Md Endadul Hoque, Sheikh Iqbal Ahamed
<span title="">2017</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ozlq63ehnjeqxf6cuxxn27cqra" style="color: black;">Information Sciences</a> </i> &nbsp;
Our protocol guarantees that the adversary cannot link the tag responses even if she can learn the identifier of the tags.  ...  Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems.  ...  Attack model In this section and the following section, we discuss how AnonPri guarantees the privacy and security of an RFID system. We first define the attack model in our system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ins.2016.07.038">doi:10.1016/j.ins.2016.07.038</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qarlw635lrhulecvcajgqon3ve">fatcat:qarlw635lrhulecvcajgqon3ve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428003224/https://epublications.marquette.edu/cgi/viewcontent.cgi?article=1493&amp;context=mscs_fac" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/16/18/1618b9fcfa76cdba8609d400c16b9cf12289c1fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ins.2016.07.038"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Performance and Security Improvements for Tor

Mashael Alsabah, Ian Goldberg
<span title="2016-09-21">2016</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network  ...  We shed light on the design weaknesses and challenges facing the network and point out unresolved issues.  ...  The statements made herein are solely the responsibility of the authors.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2946802">doi:10.1145/2946802</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xbhzj55r2vfs5hzt6dmxdffy6i">fatcat:xbhzj55r2vfs5hzt6dmxdffy6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318092727/http://eprint.iacr.org/2015/235.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ac/1c/ac1c087618cbf702ebfe25b3b6b937592f77a9b1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2946802"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure and reliable clustering in wireless sensor networks: A critical survey

Péter Schaffer, Károly Farkas, Ádám Horváth, Tamás Holczer, Levente Buttyán
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/blfmvfslmbggxhopuigjdb3jma" style="color: black;">Computer Networks</a> </i> &nbsp;
In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues.  ...  First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols.  ...  The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2012.03.021">doi:10.1016/j.comnet.2012.03.021</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lib2zv2ylvetxngh2svcjweu4a">fatcat:lib2zv2ylvetxngh2svcjweu4a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921211623/http://www.hit.bme.hu/%7Ebuttyan/publications/SchafferFHHB12comnet.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/61/1061b82a482f45546a874b66e401407155dac814.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2012.03.021"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 7,456 results