Named data networking

L Zhang, A Afanasyev, J Burke, V Jacobson… - ACM SIGCOMM …, 2014 - dl.acm.org
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …

Short group signatures

D Boneh, X Boyen, H Shacham - Annual international cryptology …, 2004 - Springer
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …

Group signatures with verifier-local revocation

D Boneh, H Shacham - Proceedings of the 11th ACM conference on …, 2004 - dl.acm.org
Group signatures have recently become important for enabling privacy-preserving
attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is …

ALARM: Anonymous location-aided routing in suspicious MANETs

K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …

Secure outsourced attribute-based signatures

X Chen, J Li, X Huang, J Li, Y Xiang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Attribute-based signature (ABS) enables users to sign messages over attributes without
revealing any information other than the fact that they have attested to the messages …

Cybersecurity dynamics: A foundation for the science of cybersecurity

S Xu - Proactive and dynamic network defense, 2019 - Springer
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis,
quantification, and management of cybersecurity from a holistic perspective, rather than from …

Attribute based group signatures

D Khader - Cryptology ePrint Archive, 2007 - eprint.iacr.org
Abstract An Attribute Based Group Signature (ABGS) allows a verifier to request a signature
from a member of a group who possesses certain attributes. Therefore, a signature should …

The cybersecurity dynamics way of thinking and landscape

S Xu - Proceedings of the 7th ACM Workshop on Moving …, 2020 - dl.acm.org
The Cybersecurity Dynamics framework offers an approach to systematically understanding,
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …

k-anonymous secret handshakes with reusable credentials

S Xu, M Yung - Proceedings of the 11th ACM conference on Computer …, 2004 - dl.acm.org
The problem of privacy-preserving authentication has been extensively investigated in a set
of diverse system settings. However, a full-fledged such mechanism called secret …

A privacy-preserving trust model for VANETs

A Tajeddine, A Kayssi, A Chehab - 2010 10th IEEE …, 2010 - ieeexplore.ieee.org
Vehicular ad hoc network (VANET) is a promising technology for providing safer roads and a
more efficient driving experience. However, the deployment of VANETs is dependent on …