![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Evaluation and Improvement of Generic-Emulating DPA Attacks
At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i.e., without any a priori knowledge about the leakage characteristics) can recover secret information ...
-
Chapter and Conference Paper
Transient-Steady Effect Attack on Block Ciphers
A new Transient-Steady Effect attack on block ciphers called TSE attack is presented in this paper. The concept of transient-steady effect denotes the phenomenon that the output of a combinational circuit keep...
-
Chapter and Conference Paper
Enhancing Traffic Locality in BitTorrent via Shared Trackers
The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested to...
-
Chapter and Conference Paper
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks
We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These proto...
-
Chapter and Conference Paper
Degree and Principal Eigenvectors in Complex Networks
The largest eigenvalue λ 1 of the adjacency matrix powerfully characterizes dynamic processes on networks, such as virus spread and synchronization. The minimization of the spectral radius by remo...
-
Chapter and Conference Paper
RandHyp: Preventing Attacks via Xen Hypercall Interface
Virtualization plays a key role in constructing cloud environments and providing services. Although the main jobs of the hypervisors are to guarantee proper isolation between domains and provide them services,...
-
Chapter and Conference Paper
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks
In recent years, widely spreading botnets in social networks are becoming a major security threat to both social networking services and the privacy of their users. In order to have a better understanding of t...
-
Chapter and Conference Paper
Sign What You Really Care about – Secure BGP AS Paths Efficiently
The inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the reliability of the Internet routing system, but forged routes generated by malicious attacks or mis-configurations...
-
Chapter and Conference Paper
Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF
Energy consumption has already become a major challenge to the current Internet. Most researches aim at lowering energy consumption under certain fixed performance constraints. Since trade-offs exist between n...
-
Chapter and Conference Paper
Enhancing Peer-to-Peer Traffic Locality through Selective Tracker Blocking
Peer-to-peer (P2P) applications, most notably BitTorrent (BT), are generating unprecedented traffic pressure to the Internet Service Providers (ISPs). To mitigate the costly inter-ISP traffic, P2P locality, wh...
-
Chapter and Conference Paper
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making
The availability and reliability of large critical infrastructures depend on decisions made by hundreds or thousands of interdependent entities and, by extension, on the information that the entities exchange ...
-
Chapter and Conference Paper
BotTrack: Tracking Botnets Using NetFlow and PageRank
With large scale botnets emerging as one of the major current threats, the automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. Faced with high...
-
Chapter and Conference Paper
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, however, has been impeded by privac...
-
Chapter and Conference Paper
Linear Obfuscation to Combat Symbolic Execution
Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious ...
-
Chapter and Conference Paper
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of sp...
-
Chapter and Conference Paper
End-to-End Throughput with Cooperative Communication in Multi-channel Wireless Networks
Although cooperative communication has been proposed at the physical layer to address multi-path fading effects, how physical layer gains with cooperative communication can translate to tangible performance be...
-
Chapter and Conference Paper
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the query to the server. Computational Private Information Retrieval (cPIR) achieves complete privac...
-
Chapter and Conference Paper
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to restrict the access to autho...
-
Chapter and Conference Paper
The Delicate Issues of Addition with Respect to XOR Differences
In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previo...
-
Chapter and Conference Paper
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many import...