Filters








179 Hits in 6.2 sec

Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks

Zhiguo Wan, Kai Xing, Yunhao Liu
2012 2012 Proceedings IEEE INFOCOM  
Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium.  ...  We propose a novel privacy preserving scheme based on network coding called Priv-Code to counter against traffic analysis attacks for wireless communications.  ...  In these systems, a mix-net is formed by a set of mix nodes, and messages are mixed when they traverse the mix-net to achieve anonymity.  ... 
doi:10.1109/infcom.2012.6195820 dblp:conf/infocom/WanXL12 fatcat:gplvnwh5dfehzhn7g3pol4nv6i

Attack of the Clones: Detecting Cloned Applications on Android Markets [chapter]

Jonathan Crussell, Clint Gibler, Hao Chen
2012 Lecture Notes in Computer Science  
Lastly, we offer examples of an open source cracking tool being used in the wild.  ...  We describe a case of malware being added to an application and show how DNADroid was able to detect two variants of the same malware.  ...  Any opinions, findings, and conclusions or recommendations expressed in this  ... 
doi:10.1007/978-3-642-33167-1_3 fatcat:puhscgetpncajpu5qdjwjbpfku

VXA: A Virtual Architecture for Durable Compressed Archives [article]

Bryan Ford
2006 arXiv   pre-print
VXA decoders run in a specialized virtual machine that implements an OS-independent execution environment based on the standard x86 architecture.  ...  VXA's adoption of a "native" processor architecture instead of type-safe language technology allows reuse of existing "hand-optimized" decoders in C and assembly language, and permits decoders access to  ...  Acknowledgments The author wishes to thank Frans Kaashoek, Russ Cox, Maxwell Krohn, and the anonymous reviewers for many helpful comments and suggestions.  ... 
arXiv:cs/0603073v1 fatcat:5wxrnki775gefnor4xwsupht7y

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers [chapter]

Rohit Chadha, Carl A. Gunter, Jose Meseguer, Ravinder Shankesi, Mahesh Viswanathan
2008 Lecture Notes in Computer Science  
By contrast, protection measures against Denial-of-Service (DoS) must assume a weaker model in which an adversary has only limited ability to interfere with network communications.  ...  In: IFIP Formal Methods for Open Object-based Distributed Systems (FMOODS '08), Oslo, Norway, June 2008.  ...  We also benefited from comments by anonymous reviewers. Rohit Chadha was supported in part by NSF CCF04-29639 and NSF CCF04-48178.  ... 
doi:10.1007/978-3-540-68863-1_4 fatcat:t2ehmpkiubhonfnxkdya3oqphm

Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations [article]

Susmit Jha
2009 arXiv   pre-print
Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature.  ...  Unlike previous approaches which treat the protocol as a white-box, our approach tries to verify an implementation provided as a black box.  ...  Acknowledgment We are thankful to David Wagner for his comments on this work which started as a course project in his graduate course on Computer Security in Fall, 2008.  ... 
arXiv:0906.5110v1 fatcat:pwtnxrom7bgurmyfbsh6s32f4u

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

Ralf C. Staudemeyer, Henrich C. Pöhls, Marcin Wójcik
2019 Journal of Reliable Intelligent Environments  
We think that this will be indispensable if IoT devices shall become a part of our daily lives without rendering us into an Orwellian society.  ...  Alongside, we provide a survey of the required strong cryptographic security mechanisms, like encryption of communication, to be in place.  ...  , distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were  ... 
doi:10.1007/s40860-019-00075-0 fatcat:rdosuiurnfhuxilrrkr3xr63t4

Modeling and analyzing mobile ad hoc networks in Real-Time Maude

Si Liu, Peter Csaba Ölveczky, José Meseguer
2016 Journal of Logical and Algebraic Methods in Programming  
In this work we present a formal framework for the modeling and analysis of MANETS based on Real-Time Maude to address this challenge.  ...  Our formal analysis has uncovered a spurious behavior in the latter protocol that is due to the subtle interplay between communication delays, node movement, and neighbor discovery.  ...  We thank the anonymous reviewers for their very insightful comments on an earlier version of this paper that has led to substantial improvements.  ... 
doi:10.1016/j.jlamp.2015.05.002 fatcat:yuevspst3na3vdbkuro52lv2jq

SoK: Automated Software Diversity

Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz
2014 2014 IEEE Symposium on Security and Privacy  
Unlike other defenses, it introduces uncertainty in the target. Precise knowledge of the target software provides the underpinning for a wide range of attacks.  ...  In this paper, we systematically study the state-of-the-art in software diversity and highlight fundamental trade-offs between fully automated approaches.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers, Prof. Greg Morrisett, Stephen Crane, and Mark Murphy for their insightful reviews, helpful suggestions, and proofreading.  ... 
doi:10.1109/sp.2014.25 dblp:conf/sp/LarsenHBF14 fatcat:2z54gsh6cbhk3ihyaq4i6he7h4

Tiles for Reo [chapter]

Farhad Arbab, Roberto Bruni, Dave Clarke, Ivan Lanese, Ugo Montanari
2009 Lecture Notes in Computer Science  
A mapping of a fragment of Reo into the Tile Model has been already presented in [4] .  ...  The Tile Model also extends José Meseguer's rewriting logic [15] (in the non-conditional case) by taking into account rewrite with side effects and rewrite synchronization.  ...  A tile system R = (H , V , N, R) enjoys the basic source property if for each A ∈ N if R(A) = s, a, b,t , then s is an operator in Σ.  ... 
doi:10.1007/978-3-642-03429-9_4 fatcat:dg4ieu555zbbrbqpipsxyvjngi

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini
2015 Computer Networks  
Moreover, the high number of interconnected devices arises scalability issues; therefore a flexible infrastructure is needed able to deal with security threats in such a dynamic environment.  ...  In this scenario, the satisfaction of security and privacy requirements plays a fundamental role.  ...  For instance, the same IoT system could leverage the capabilities of a wireless sensor network (WSN) that collects the environmental information in a given area and a set of smartphones on top of which  ... 
doi:10.1016/j.comnet.2014.11.008 fatcat:nk2nml75efgkrj2soewtdpgvv4

Performance optimizations for wireless wide-area networks

Rajiv Chakravorty, Suman Banerjee, Pablo Rodriguez, Julian Chesterfield, Ian Pratt
2004 Proceedings of the 10th annual international conference on Mobile computing and networking - MobiCom '04  
We present a comparative performance study of a wide selection of optimization techniques to enhance application performance in the context of wide-area wireless networks (WWANs).  ...  The goals of this paper are: (1) to perform an accurate benchmark of application performance over such commercially deployed WWAN environments, (2) to implement and characterize the impact of various optimization  ...  We owe our gratitude to Andrew Campbell, Jon Crowcroft and Ram Ramjee for their feedback at different stages that helped in improving the quality of our paper.  ... 
doi:10.1145/1023720.1023737 dblp:conf/mobicom/ChakravortyBRCP04 fatcat:pnn6k2i6gjaj3l4zambdr6afzm

HiGHmed – An Open Platform Approach to Enhance Care and Research across Institutional Boundaries

Björn Schreiweis, Sabine Rey, Ulrich Sax, Simone Scheithauer, Otto Rienhoff, Petra Knaup-Gregori, Udo Bavendiek, Christoph Dieterich, Benedikt Brors, Inga Kraus, Caroline Thoms, Dirk Jäger (+7 others)
2018 Methods of Information in Medicine  
By establishing a shared information governance framework, data integration centers and an open platform architecture in cooperation with independent healthcare providers, the meaningful reuse of data  ...  Moreover, firm and sustainable commitment by participating organizations to collaborate in further development of their information system architectures is needed.  ...  We consider data steward-supported single-source modeling as a mandatory precondition in a distributed environment to enforce semantic traceability through all system layers at all sites, thus avoiding  ... 
doi:10.3414/me18-02-0002 pmid:30016813 pmcid:PMC6193407 fatcat:qxjethbbgzgwxgrgdgnhklahfy

An institutional approach to computational social creativity [article]

Joseph Corneli
2016 arXiv   pre-print
Modelling the creativity that takes place in social settings presents a range of theoretical challenges.  ...  Mel Rhodes's classic "4Ps" of creativity, the "Person, Process, Product, and Press," offer an initial typology.  ...  The anonymous reviewers made many useful comments on matters of presentation.  ... 
arXiv:1605.02309v2 fatcat:undzplqvqjevjim5rleqkbtfsi

Querying the Internet with PIER [chapter]

Ryan Huebsch, Joseph M. Hellerstein, Nick Lanham, Boon Thau Loo, Scott Shenker, Ion Stoica
2003 Proceedings 2003 VLDB Conference  
environments.  ...  We motivate the need for massively distributed queries, and argue for a relaxation of certain traditional database research goals in the pursuit of scalability and widespread adoption.  ...  We show that a system like PIER presents a "technology push" toward viable, massively distributed query processing at a significantly larger scale than previously demonstrated.  ... 
doi:10.1016/b978-012722442-8/50036-7 dblp:conf/vldb/HuebschHLLSS03 fatcat:szrq7ch53bbidkkoszn3hn7oey

Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project

Maria Pateraki, Manolis Lourakis, Leonidas Kallipolitis, Frank Werner, Petros Patias, Christos Pikridas
2019 Zenodo  
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project  ...  as an application in a trustworthy IoT environment.  ...  Cameras, wristwatches, environmental and location sensors as well as users' speech comprise the list of data sources that feed the system.  ... 
doi:10.5281/zenodo.4294256 fatcat:ovybcpqny5eppniw7hb5vcsevy
« Previous Showing results 1 — 15 out of 179 results