J Liang, J Jiang, H Duan, K Li, T Wan… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
Content Delivery Network (CDN) and Hypertext Transfer Protocol Secure (HTTPS) are two popular but independent web technologies, each of which has been well studied …
J Samuel, N Mathewson, J Cappos… - Proceedings of the 17th …, 2010 - dl.acm.org
Today's software update systems have little or no defense against key compromise. As a result, key compromises have put millions of software update clients at risk. Here we identify …
W Lootah, W Enck, P McDaniel - Computer networks, 2007 - Elsevier
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in ARP enable a raft of Internet Protocol (IP)-based …
D Rosaci, GML Sarné… - International Journal of …, 2012 - Wiley Online Library
Several models have been proposed in the past for representing both reliability and reputation. However, we remark that a crucial point in the practical use of these two …
D Boneh, X Ding, G Tsudik - ACM Transactions on Internet Technology …, 2004 - dl.acm.org
We present a new approach for fine-grained control over users' security privileges (fast revocation of credentials) centered around the concept of an on-line semi-trusted mediator …
A Buldas, D Draheim, T Nagumo… - Future Data and Security …, 2020 - Springer
Since the introduction of Bitcoin in 2009 and its immense resonance in media, we have seen a plethora of envisioned blockchain solutions. Usually, such blockchain solutions claim to be …
Due to memory and processing limitations, Internet-of-Things (IoT) devices require external fog servers to perform some of their tasks. However, this offloading of tasks comes at the cost …
P McDaniel, A Rubin - … : 4th International Conference, FC 2000 Anguilla …, 2001 - Springer
The massive growth of electronic commerce on the Internet heightens concerns over the lack of meaningful certificate management. One issue limiting the availability of such …