A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
2012
2012 Proceedings IEEE INFOCOM
Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. ...
We propose a novel privacy preserving scheme based on network coding called Priv-Code to counter against traffic analysis attacks for wireless communications. ...
In these systems, a mix-net is formed by a set of mix nodes, and messages are mixed when they traverse the mix-net to achieve anonymity. ...
doi:10.1109/infcom.2012.6195820
dblp:conf/infocom/WanXL12
fatcat:gplvnwh5dfehzhn7g3pol4nv6i
Attack of the Clones: Detecting Cloned Applications on Android Markets
[chapter]
2012
Lecture Notes in Computer Science
Lastly, we offer examples of an open source cracking tool being used in the wild. ...
We describe a case of malware being added to an application and show how DNADroid was able to detect two variants of the same malware. ...
Any opinions, findings, and conclusions or recommendations expressed in this ...
doi:10.1007/978-3-642-33167-1_3
fatcat:puhscgetpncajpu5qdjwjbpfku
VXA: A Virtual Architecture for Durable Compressed Archives
[article]
2006
arXiv
pre-print
VXA decoders run in a specialized virtual machine that implements an OS-independent execution environment based on the standard x86 architecture. ...
VXA's adoption of a "native" processor architecture instead of type-safe language technology allows reuse of existing "hand-optimized" decoders in C and assembly language, and permits decoders access to ...
Acknowledgments The author wishes to thank Frans Kaashoek, Russ Cox, Maxwell Krohn, and the anonymous reviewers for many helpful comments and suggestions. ...
arXiv:cs/0603073v1
fatcat:5wxrnki775gefnor4xwsupht7y
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers
[chapter]
2008
Lecture Notes in Computer Science
By contrast, protection measures against Denial-of-Service (DoS) must assume a weaker model in which an adversary has only limited ability to interfere with network communications. ...
In: IFIP Formal Methods for Open Object-based Distributed Systems (FMOODS '08), Oslo, Norway, June 2008. ...
We also benefited from comments by anonymous reviewers. Rohit Chadha was supported in part by NSF CCF04-29639 and NSF CCF04-48178. ...
doi:10.1007/978-3-540-68863-1_4
fatcat:t2ehmpkiubhonfnxkdya3oqphm
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
[article]
2009
arXiv
pre-print
Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature. ...
Unlike previous approaches which treat the protocol as a white-box, our approach tries to verify an implementation provided as a black box. ...
Acknowledgment We are thankful to David Wagner for his comments on this work which started as a course project in his graduate course on Computer Security in Fall, 2008. ...
arXiv:0906.5110v1
fatcat:pwtnxrom7bgurmyfbsh6s32f4u
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
2019
Journal of Reliable Intelligent Environments
We think that this will be indispensable if IoT devices shall become a part of our daily lives without rendering us into an Orwellian society. ...
Alongside, we provide a survey of the required strong cryptographic security mechanisms, like encryption of communication, to be in place. ...
, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were ...
doi:10.1007/s40860-019-00075-0
fatcat:rdosuiurnfhuxilrrkr3xr63t4
Modeling and analyzing mobile ad hoc networks in Real-Time Maude
2016
Journal of Logical and Algebraic Methods in Programming
In this work we present a formal framework for the modeling and analysis of MANETS based on Real-Time Maude to address this challenge. ...
Our formal analysis has uncovered a spurious behavior in the latter protocol that is due to the subtle interplay between communication delays, node movement, and neighbor discovery. ...
We thank the anonymous reviewers for their very insightful comments on an earlier version of this paper that has led to substantial improvements. ...
doi:10.1016/j.jlamp.2015.05.002
fatcat:yuevspst3na3vdbkuro52lv2jq
SoK: Automated Software Diversity
2014
2014 IEEE Symposium on Security and Privacy
Unlike other defenses, it introduces uncertainty in the target. Precise knowledge of the target software provides the underpinning for a wide range of attacks. ...
In this paper, we systematically study the state-of-the-art in software diversity and highlight fundamental trade-offs between fully automated approaches. ...
ACKNOWLEDGMENTS We thank the anonymous reviewers, Prof. Greg Morrisett, Stephen Crane, and Mark Murphy for their insightful reviews, helpful suggestions, and proofreading. ...
doi:10.1109/sp.2014.25
dblp:conf/sp/LarsenHBF14
fatcat:2z54gsh6cbhk3ihyaq4i6he7h4
Tiles for Reo
[chapter]
2009
Lecture Notes in Computer Science
A mapping of a fragment of Reo into the Tile Model has been already presented in [4] . ...
The Tile Model also extends José Meseguer's rewriting logic [15] (in the non-conditional case) by taking into account rewrite with side effects and rewrite synchronization. ...
A tile system R = (H , V , N, R) enjoys the basic source property if for each A ∈ N if R(A) = s, a, b,t , then s is an operator in Σ. ...
doi:10.1007/978-3-642-03429-9_4
fatcat:dg4ieu555zbbrbqpipsxyvjngi
Security, privacy and trust in Internet of Things: The road ahead
2015
Computer Networks
Moreover, the high number of interconnected devices arises scalability issues; therefore a flexible infrastructure is needed able to deal with security threats in such a dynamic environment. ...
In this scenario, the satisfaction of security and privacy requirements plays a fundamental role. ...
For instance, the same IoT system could leverage the capabilities of a wireless sensor network (WSN) that collects the environmental information in a given area and a set of smartphones on top of which ...
doi:10.1016/j.comnet.2014.11.008
fatcat:nk2nml75efgkrj2soewtdpgvv4
Performance optimizations for wireless wide-area networks
2004
Proceedings of the 10th annual international conference on Mobile computing and networking - MobiCom '04
We present a comparative performance study of a wide selection of optimization techniques to enhance application performance in the context of wide-area wireless networks (WWANs). ...
The goals of this paper are: (1) to perform an accurate benchmark of application performance over such commercially deployed WWAN environments, (2) to implement and characterize the impact of various optimization ...
We owe our gratitude to Andrew Campbell, Jon Crowcroft and Ram Ramjee for their feedback at different stages that helped in improving the quality of our paper. ...
doi:10.1145/1023720.1023737
dblp:conf/mobicom/ChakravortyBRCP04
fatcat:pnn6k2i6gjaj3l4zambdr6afzm
HiGHmed – An Open Platform Approach to Enhance Care and Research across Institutional Boundaries
2018
Methods of Information in Medicine
By establishing a shared information governance framework, data integration centers and an open platform architecture in cooperation with independent healthcare providers, the meaningful reuse of data ...
Moreover, firm and sustainable commitment by participating organizations to collaborate in further development of their information system architectures is needed. ...
We consider data steward-supported single-source modeling as a mandatory precondition in a distributed environment to enforce semantic traceability through all system layers at all sites, thus avoiding ...
doi:10.3414/me18-02-0002
pmid:30016813
pmcid:PMC6193407
fatcat:qxjethbbgzgwxgrgdgnhklahfy
An institutional approach to computational social creativity
[article]
2016
arXiv
pre-print
Modelling the creativity that takes place in social settings presents a range of theoretical challenges. ...
Mel Rhodes's classic "4Ps" of creativity, the "Person, Process, Product, and Press," offer an initial typology. ...
The anonymous reviewers made many useful comments on matters of presentation. ...
arXiv:1605.02309v2
fatcat:undzplqvqjevjim5rleqkbtfsi
Querying the Internet with PIER
[chapter]
2003
Proceedings 2003 VLDB Conference
environments. ...
We motivate the need for massively distributed queries, and argue for a relaxation of certain traditional database research goals in the pursuit of scalability and widespread adoption. ...
We show that a system like PIER presents a "technology push" toward viable, massively distributed query processing at a significantly larger scale than previously demonstrated. ...
doi:10.1016/b978-012722442-8/50036-7
dblp:conf/vldb/HuebschHLLSS03
fatcat:szrq7ch53bbidkkoszn3hn7oey
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project
2019
Zenodo
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project ...
as an application in a trustworthy IoT environment. ...
Cameras, wristwatches, environmental and location sensors as well as users' speech comprise the list of data sources that feed the system. ...
doi:10.5281/zenodo.4294256
fatcat:ovybcpqny5eppniw7hb5vcsevy
« Previous
Showing results 1 — 15 out of 179 results