Sciweavers

362 search results - page 55 / 73
» Extending the Resynchronization Attack
Sort
View
114
Voted
WWW
2008
ACM
16 years 3 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
120
Voted
CCS
2009
ACM
15 years 9 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
98
Voted
DSN
2009
IEEE
15 years 9 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
124
Voted
ICNP
2009
IEEE
15 years 9 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
116
Voted
WINE
2009
Springer
111views Economy» more  WINE 2009»
15 years 9 months ago
Prediction Mechanisms That Do Not Incentivize Undesirable Actions
A potential downside of prediction markets is that they may incentivize agents to take undesirable actions in the real world. For example, a prediction market for whether a terrori...
Peng Shi, Vincent Conitzer, Mingyu Guo