Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
Signiļ¬cant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
AbstractāCurrent techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...