The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...