Secure and efficient key management in mobile ad hoc networks

B Wu, J Wu, EB Fernandez… - 19th IEEE International …, 2005 - ieeexplore.ieee.org
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of
infrastructure, providing secure communications is a big challenge in this unique network …

Fairblock: Preventing blockchain front-running with minimal overheads

P Momeni, S Gorbunov, B Zhang - … Conference on Security and Privacy in …, 2022 - Springer
While blockchain systems are quickly gaining popularity, front-running remains a major
obstacle to fair exchange. In this paper, we show how to apply identity-based encryption …

APSS: Proactive secret sharing in asynchronous systems

L Zhou, FB Schneider, R Van Renesse - ACM transactions on …, 2005 - dl.acm.org
APSS, a proactive secret sharing (PSS) protocol for asynchronous systems, is explained and
proved correct. The protocol enables a set of secret shares to be periodically refreshed with …

Verifiable secret redistribution for archive systems

TM Wong, C Wang, JM Wing - First International IEEE Security …, 2002 - ieeexplore.ieee.org
We present a new verifiable secret redistribution protocol for threshold sharing schemes that
forms a key component of a proposed archival storage system. Our protocol supports …

POTSHARDS—a secure, recoverable, long-term archival storage system

MW Storer, KM Greenan, EL Miller… - ACM Transactions on …, 2009 - dl.acm.org
Users are storing ever-increasing amounts of information digitally, driven by many factors
including government regulations and the public's desire to digitally record their personal …

POTSHARDS: secure long-term storage without encryption

MW Storer, KM Greenan, EL Miller… - 2007 USENIX annual …, 2008 - escholarship.org
Users are storing ever-increasing amounts of information digitally, driven by many factors
including government regulations and the public's desire to digitally record their personal …

Dynamic, privacy-preserving decentralized reputation systems

MR Clark, K Stewart… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Reputation systems provide an important basis for judging whether to interact with others in
a networked system. Designing such systems is especially interesting in decentralized …

Adaptive clustering with feature ranking for DDoS attacks detection

L Zi, J Yearwood, XW Wu - 2010 fourth international …, 2010 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current
internet. The detection of such attacks plays an important role in maintaining the security of …

Long term confidentiality: a survey

J Braun, J Buchmann, C Mullan… - Designs, Codes and …, 2014 - Springer
Sensitive electronic data may be required to remain confidential for long periods of time. Yet
encryption under a computationally secure cryptosystem cannot provide a guarantee of long …

Long-term threats to secure archives

MW Storer, K Greenan, EL Miller - … of the second ACM workshop on …, 2006 - dl.acm.org
Archival storage systems are designed for a write-once, read-maybe usage model which
places an emphasis on the long-term preservation of their data contents. In contrast to …