Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Abstract. In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed en...
John Kelsey, Andrew Regenscheid, Tal Moran, David ...
We continue our study of document marking to deter illicit dissemination. A n experiment we performed reveals that the distortion on the photocopy of a document is very different ...
Steven H. Low, Nicholas F. Maxemchuk, Jack Brassil...
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...