Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...