We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...