Sciweavers

CCS
2010
ACM
13 years 11 months ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...
CCS
2010
ACM
13 years 11 months ago
Retaining sandbox containment despite bugs in privileged memory-safe code
Justin Cappos, Armon Dadgar, Jeff Rasley, Justin S...
CCS
2010
ACM
13 years 11 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
CCS
2010
ACM
13 years 11 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
CCS
2010
ACM
13 years 11 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
13 years 11 months ago
Survivable key compromise in software update systems
Justin Samuel, Nick Mathewson, Justin Cappos, Roge...
CCS
2010
ACM
13 years 11 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang