Filters








422 Hits in 7.2 sec

Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions [chapter]

Gene Itkis
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
With this mechanism, gSiBIR becomes the first generic intrusion-resilient signature scheme with no limit on the number of periods.  ...  Signer-Base Intrusion-Resilient (SiBIR) signature schemes were defined in [IR02] .  ...  of the strong RSA assumption).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36413-7_8">doi:10.1007/3-540-36413-7_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5lzbqhbrsbbt3m5vrmmtsct4hq">fatcat:5lzbqhbrsbbt3m5vrmmtsct4hq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060915061332/http://www.cs.bu.edu/~itkis/pap/gsibir.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ae/82/ae82b003af90517580fe52a125f4362cd01b2d94.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-36413-7_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Exploiting social networks for threshold signing

Shouhuai Xu, Xiaohu Li, Paul Parker
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS &#39;08</a> </i> &nbsp;
Digital signatures are an important security mechanism, especially when non-repudiation is desired.  ...  One approach to resolving, or at least alleviating, this problem is to use threshold cryptography. But how should such techniques be employed in the real world?  ...  pairs, to generate a new signature is negligible in κ [13] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368358">doi:10.1145/1368310.1368358</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/XuLP08.html">dblp:conf/ccs/XuLP08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dnfpyqyrabh2nkxafizzhdti4q">fatcat:dnfpyqyrabh2nkxafizzhdti4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217162338/https://static.aminer.org/pdf/20170130/pdfs/ccs/srvbmc3oq9tol1df0wfuqj4pcvtli8h7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/15/02/1502b48b8934448da5ecdbbde1ebba9f3d543468.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368310.1368358"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Practical Intrusion-Tolerant Networks

Daniel Obenshain, Thomas Tantillo, Amy Babay, John Schultz, Andrew Newell, Md. Edadul Hoque, Yair Amir, Cristina Nita-Rotaru
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s77bfh66ena2znlnuhuruo464a" style="color: black;">2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)</a> </i> &nbsp;
We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness.  ...  We deploy and evaluate the intrusion-tolerant overlay implementation on a global cloud spanning East Asia, North America, and Europe, and make it publicly available.  ...  We presented the first practical intrusion-tolerant network service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdcs.2016.99">doi:10.1109/icdcs.2016.99</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icdcs/ObenshainTBSNHA16.html">dblp:conf/icdcs/ObenshainTBSNHA16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6rk4si26hrcg3ctkdjbm5acfo4">fatcat:6rk4si26hrcg3ctkdjbm5acfo4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170504122055/http://www.cnds.jhu.edu/~babay/pubs/cnds-2016-2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/f9/57f9bedfe51bd3ffa16e394ce461002179712fb9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdcs.2016.99"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

CoverDrop: Blowing the Whistle Through A News App

Mansoor Ahmed-Rengers, Diana A. Vasile, Daniel Hugenroth, Alastair R. Beresford, Ross Anderson
<span title="2022-03-03">2022</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/feed3pdnijhbnm6huwkkxavghy" style="color: black;">Proceedings on Privacy Enhancing Technologies</a> </i> &nbsp;
Whistleblowing is hazardous in a world of pervasive surveillance, yet many leading newspapers expect sources to contact them with methods that are either insecure or barely usable.  ...  CoverDrop is designed to resist a powerful global adversary with the ability to issue warrants against infrastructure providers, yet it can easily be integrated into existing infrastructure.  ...  This gives it strong resilience to warrants served on ISPs, news organisations and even the whistleblower.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/popets-2022-0035">doi:10.2478/popets-2022-0035</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/druniv6taza27d7pocog3exbyq">fatcat:druniv6taza27d7pocog3exbyq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309125043/https://www.sciendo.com/pdf/10.2478/popets-2022-0035" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/08/1a08403f9acb77dd45d374e929bc6fa523edcdb7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/popets-2022-0035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Towards the Science of Security and Privacy in Machine Learning [article]

Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael Wellman
<span title="2016-11-11">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We conclude by formally exploring the opposing relationship between model accuracy and resilience to adversarial manipulation.  ...  We articulate a comprehensive threat model for ML, and categorize attacks and defenses within an adversarial framework.  ...  This attack forces Polygraph to generate signatures with tokens that do not correspond to invariants of the worm's behavior.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1611.03814v1">arXiv:1611.03814v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wg3hla7vpnedpjx6rwnvjodsba">fatcat:wg3hla7vpnedpjx6rwnvjodsba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201014041145/https://arxiv.org/pdf/1611.03814v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/ab/ebab687cd1be7d25392c11f89fce6a63bef7219d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1611.03814v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

SoK: Security and Privacy in Machine Learning

Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael P. Wellman
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u2svuludwbbl3kyi56ta4uqumm" style="color: black;">2018 IEEE European Symposium on Security and Privacy (EuroS&amp;P)</a> </i> &nbsp;
We conclude by formally exploring the opposing relationship between model accuracy and resilience to adversarial manipulation.  ...  We articulate a comprehensive threat model for ML, and categorize attacks and defenses within an adversarial framework.  ...  This attack forces Polygraph to generate signatures with tokens that do not correspond to invariants of the worm's behavior.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2018.00035">doi:10.1109/eurosp.2018.00035</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurosp/PapernotMSW18.html">dblp:conf/eurosp/PapernotMSW18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zt6iwhj5vbdfhh4c3kvwwkupv4">fatcat:zt6iwhj5vbdfhh4c3kvwwkupv4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709030808/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5793&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/ad/cead7a8abd477f2760ce40f18430c55078f2fdbb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/eurosp.2018.00035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Composable and Robust Outsourced Storage [chapter]

Christian Badertscher, Ueli Maurer
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To complete the picture, we state the additional assumptions for this audit mechanism to be provably secure and investigate the (in)applicability of hash-function constructions in this setting.  ...  Our denition is stronger than previous denitions for oblivious RAM or software protection, and assures strong security guarantees against active attacks.  ...  F mem is a quite strong assumption. For example, the adversary does not see the values uploaded to the storage.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-76953-0_19">doi:10.1007/978-3-319-76953-0_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/63jfz3cl45dgbfevwildllxrk4">fatcat:63jfz3cl45dgbfevwildllxrk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710114233/http://eprint.iacr.org/2017/133.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/86/0e86451b5fc3e1bfd8c09faf488b091b3b8c7d10.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-76953-0_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Evaluation of Support Vector Machines in Adversarial Environments [chapter]

Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, Fabio Roli
<span title="">2014</span> <i title="Springer International Publishing"> Support Vector Machines Applications </i> &nbsp;
), or gain information about their internal parameters (privacy breaches).  ...  First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems.  ...  This model is often constructed using machine-learning techniques, such as one-class classifiers (e.g., one-class SVMs), or, more generally, using density estimators.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-02300-7_4">doi:10.1007/978-3-319-02300-7_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3te2r2qrjzctrg6n6voqlhavte">fatcat:3te2r2qrjzctrg6n6voqlhavte</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811131632/http://pralab.diee.unica.it/sites/default/files/biggio14-svm-chapter.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/93/7f93b0b25043c92dc3eb77b5b7e2834b7d36d3ad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-02300-7_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security Evaluation of Support Vector Machines in Adversarial Environments [article]

Battista Biggio and Igino Corona and Blaine Nelson and Benjamin I. P. Rubinstein and Davide Maiorca and Giorgio Fumera and Giorgio Giacinto and and Fabio Roli
<span title="2014-01-30">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
), or gain information about their internal parameters (privacy breaches).  ...  First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems.  ...  This model is often constructed using machine-learning techniques, such as one-class classifiers (e.g., one-class SVMs), or, more generally, using density estimators.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1401.7727v1">arXiv:1401.7727v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bv6gkj2aebhg3lv5n36btnbaka">fatcat:bv6gkj2aebhg3lv5n36btnbaka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200911083520/https://arxiv.org/pdf/1401.7727v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/16/b616a9f9beb3b5950d8179dc9ba3c817ef6bd6f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1401.7727v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Rights protection for categorical data

R. Sion, M. Atallah, S. Prabhakar
<span title="">2005</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ht3yl6qfebhwrg7vrxkz4gxv3q" style="color: black;">IEEE Transactions on Knowledge and Data Engineering</a> </i> &nbsp;
The method is proved (experimentally and by analysis) to be extremely resilient to both alteration and data loss attacks, for example, tolerating up to 80 percent data loss with a watermark alteration  ...  The Adversary There is a set of attacks that can be performed by evil Mallory with the purpose of defeating the watermark while preserving the value in the data.  ...  If the assumption is made that the attack alterations do not destroy the value of the data, then A3 should be defeatable by embedding the primitive mark in resilient global data properties.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tkde.2005.116">doi:10.1109/tkde.2005.116</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbuk3vo37zbdpmqbqdr6dz4wpm">fatcat:kbuk3vo37zbdpmqbqdr6dz4wpm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171025163048/https://core.ac.uk/download/pdf/21174332.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/df/4bdf3ff1cbdbfa10ab94f40c6a1ecd94d2b20f02.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tkde.2005.116"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Information Security in Wireless Sensor Networks [chapter]

Abdelraouf Ouadjaout, Miloud Bagaa, Abdelmalik Bachir, Yacine Challal, Nouredine Lasla, Lyes Khelladi
<span title="">2009</span> <i title="WORLD SCIENTIFIC"> Encyclopedia on Ad Hoc and Ubiquitous Computing </i> &nbsp;
This introduces many security vulnerabilities at two different levels: attacking route construction and maintenance, and attacking data payload through packet injection, modification or suppression.  ...  This close physical coupling with environment leads to frequent intentional or accidental compromising of sensor nodes.  ...  Resilience to node capture When a sensor node is captured by an adversary, its entire secret and the entire established links with its neighbors are compromised.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1142/9789812833495_0017">doi:10.1142/9789812833495_0017</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qhh6vtqfxza2xllthuh5yo2fju">fatcat:qhh6vtqfxza2xllthuh5yo2fju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170924095459/https://hal.archives-ouvertes.fr/hal-00543985/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ac/59/ac59ac239b1e2e978c65cfaf609bdaed3650a987.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1142/9789812833495_0017"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> worldscientific.com </button> </a>

Security in Wireless Sensor Networks [article]

Jaydip Sen
<span title="2013-01-22">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Current studies on security in WSNs focus on individual topics such as key management, secure routing, secure data aggregation, and intrusion detection.  ...  The ECC-based signature is generated and verified with the elliptic curve digital signature algorithm (ECDSA) [70] .  ...  The WSN is assumed to be administered by a central point with each sensor having a certificate signed by the central point's private key using an RSA or ECC signature.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1301.5065v1">arXiv:1301.5065v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b6agtqm35rebbcfbovkam2xkbu">fatcat:b6agtqm35rebbcfbovkam2xkbu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928132830/https://arxiv.org/ftp/arxiv/papers/1301/1301.5065.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/50/fc507af9c2ce83a852cceb98c9545dd17723f673.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1301.5065v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Survey on Wireless Sensor Network Security [article]

Jaydip Sen
<span title="2010-11-06">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs.  ...  The ECC-based signature is generated and verified with the Elliptic Curve Digital Signature Algorithm (ECDSA) [108] .  ...  The WSN is assumed to be administered by a central point with each sensor having a certificate signed by the central point's private key using an RSA or ECC signature.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1011.1529v1">arXiv:1011.1529v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/syvw3mhclfgclktanjz6ynkd7m">fatcat:syvw3mhclfgclktanjz6ynkd7m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191019214940/https://arxiv.org/pdf/1011.1529v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/e2/f3e2a17535dd1db845ff19eab15301936cd84059.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1011.1529v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Hotspot-based traceback for mobile ad hoc networks

Yi-an Huang, Wenke Lee
<span title="">2005</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3zbiqzirpfhdfhce42hmfkjg4i" style="color: black;">Proceedings of the 4th ACM workshop on Wireless security - WiSe &#39;05</a> </i> &nbsp;
In particular, our solution is fully distributed and resilient in the face of arbitrary number of collaborative adversaries.  ...  In this paper, we develop a new technique, namely Tagged Bloom Filters, as an efficient means to store additional information associated with each incoming packet.  ...  While these assumptions are typically valid in wired networks, they generally do not hold in MANET.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1080793.1080802">doi:10.1145/1080793.1080802</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ws/HuangL05.html">dblp:conf/ws/HuangL05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/64avlsf2yvgxbjdbpypvr3ie4e">fatcat:64avlsf2yvgxbjdbpypvr3ie4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812074325/https://www.cc.gatech.edu/people/home/wenke/papers/wise05.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/ba/10badad3a41efd0c1dd6951d596725a407c59205.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1080793.1080802"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Watermarking, tamper-proofing, and obfuscation - tools for software protection

C.S. Collberg, C. Thomborson
<span title="">2002</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dthyqga2onff5nwf4agwqtrhxi" style="color: black;">IEEE Transactions on Software Engineering</a> </i> &nbsp;
Code obfuscation is very similar to code optimization, except that, with obfuscation, we are maximizing obscurity while minimizing execution time; whereas, with optimization, we are just minimizing execution  ...  Fig. 5 shows a simple example of how strong opaque predicates can be constructed based on the intractability of alias analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2002.1027797">doi:10.1109/tse.2002.1027797</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x3lechbrnrfopg5k6q6qiqnbyu">fatcat:x3lechbrnrfopg5k6q6qiqnbyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721184157/https://www.cs.auckland.ac.nz/~cthombor/Pubs/01027797a.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/61/af61d5caad8e874f3f2f9ab5b773154e4e164d99.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2002.1027797"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 422 results