This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
Abstract. Although the number of online privacy policies is increasing, it remains difficult for Internet users to understand them, let alone to compare policies across sites or i...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...