The drunk motorcyclist protocol for anonymous communication (English)
- New search for: Young, Adam L.
- New search for: Yung, Moti
- New search for: Young, Adam L.
- New search for: Yung, Moti
In:
2014 IEEE Conference on Communications and Network Security
;
157-165
;
2014
-
ISBN:
- Conference paper / Electronic Resource
-
Title:The drunk motorcyclist protocol for anonymous communication
-
Contributors:Young, Adam L. ( author ) / Yung, Moti ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2014-10-01
-
Size:614049 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
M2MSec'14: Workshop on security and privacy in machine-to-machine communications (M2MSec'14) - Committees and welcome| 2014
- 1
-
Program| 2014
- 1
-
Workshop on physical layer methods for wireless security (PhySec 14): 2014 IEEE conference on communications and network security (CNS): Workshop on physical-layer methods for wireless security (PhySec'14) - Program| 2014
- 1
-
Author index| 2014
- 1
-
M2MSec'14: Workshop on security and privacy in machine-to-machine communications (M2MSec'14) - Program| 2014
- 1
-
IEEE CNS 2014 - Poster session: IEEE CNS 2014 poster session - Program| 2014
- 1
-
IEEE CNS 2014 - Poster session: IEEE CNS 2014 poster session - Committees and welcome| 2014
- 1
-
Workshop on cognitive radio and electromagnetic spectrum security (CRESS 14): 2014 IEEE conference on communications and network security (CNS): Workshop on cognitive radio and electromagnetic spectrum security (CRESS'14) - Program| 2014
- 1
-
Workshop on physical layer methods for wireless security (PhySec 14): 2014 IEEE conference on communications and network security (CNS): Workshop on physical-layer methods for wireless security (PhySec'14) - Committees and welcome| 2014
- 1
-
Achievable secrecy capacity in an underlay cognitive radio networkSibomana, Louis / Zepernick, Hans-Jurgen / Tran, Hung et al. | 2014
- 1
-
Index| 2014
- 1
-
Workshop on cognitive radio and electromagnetic spectrum security (CRESS 14): 2014 IEEE conference on communications and network security (CNS): Workshop on cognitive radio and electromagnetic spectrum security (CRESS'14) - Committees and welcome| 2014
- 1
-
Committees| 2014
- 7
-
Measuring smart jammer strategy efficacy over the airCarlson, C. / Nguyen, V. / Hitefield, S. / O'Shea, T. / Clancy, T. et al. | 2014
- 14
-
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETsMarttinen, Aleksi / Wyglinski, Alexander M. / Jantti, Riku et al. | 2014
- 21
-
JADE: Jamming-averse routing on cognitive radio mesh networksKim, Yu Seung / DeBruhl, Bruce / Tague, Patrick et al. | 2014
- 29
-
Secure distributed spectrum sensing in cognitive radio networks using multi-armed banditsSodagari, Shabnam et al. | 2014
- 35
-
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presenceGarnaev, Andrey / Trappe, Wade et al. | 2014
- 44
-
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEAJin, Zituo / Morgan, J.P. / Anand, S. / Subbalakshmi, K.P. et al. | 2014
- 53
-
Trust-based data fusion mechanism design in cognitive radio networksWang, Ji / Chen, Ing-Ray et al. | 2014
- 60
-
Demonstrated LLC-layer attack and defense strategies for wireless communication systemsHitefield, S. / Nguyen, V. / Carlson, C. / O'Shea, T. / Clancy, T. et al. | 2014
- 67
-
Securing smart home: Technologies, security challenges, and security requirementsLee, Changmin / Zappaterra, Luca / Kwanghee Choi, / Hyeong-Ah Choi, et al. | 2014
- 73
-
Integration and evaluation of intrusion detection for CoAP in smart city applicationsKrimmling, Jana / Peter, Steffen et al. | 2014
- 79
-
An experimental study of security and privacy risks with emerging household appliancesNotra, Sukhvir / Siddiqi, Muhammad / Habibi Gharakheili, Hassan / Sivaraman, Vijay / Boreli, Roksana et al. | 2014
- 85
-
Practical and secure Machine-to-Machine data collection protocol in Smart GridUludag, Suleyman / Lui, King-Shan / Ren, Wenyu / Nahrstedt, Klara et al. | 2014
- 91
-
Identity-based protocol design patterns for machine-to-machine secure channelsCorella, Francisco / Lewison, Karen P. et al. | 2014
- 97
-
RF-fingerprint based authentication: Exponents and achievable ratesGungor, Onur / Koksal, C. Emre et al. | 2014
- 103
-
The security of link signature: A view from channel modelsHe, Xiaofan / Dai, Huaiyu / Huang, Yufan / Wang, Dong / Shen, Wenbo / Ning, Peng et al. | 2014
- 109
-
On secure communication over multiple access wiretap channels under channel uncertaintySchaefer, Rafael F. / Poor, H. Vincent et al. | 2014
- 115
-
Parity modifications and stopping sets in high-rate codes for physical-layer securityHarrison, Willie K. / Boyce, Parker et al. | 2014
- 121
-
On the fading Gaussian wiretap channel with statistical channel state information at transmitterLin, Pin-Hsun / Jorswieck, Eduard et al. | 2014
- 127
-
Uniform distributed source coding for the multiple access wiretap channelChou, Remi A. / Bloch, Matthieu R. et al. | 2014
- 133
-
MCR Decoding: A MIMO approach for defending against wireless jamming attacksShen, Wenbo / Ning, Peng / He, Xiaofan / Dai, Huaiyu / Liu, Yao et al. | 2014
- 139
-
Relay-based secret key generation in LTE-AChen, Kan / Natarajan, Balasubramaniam / Shattil, Steve et al. | 2014
- 145
-
Signal alignment for secure underwater coordinated multipoint transmissionsWang, Chaofeng / Wang, Zhaohui / Nooshabadi, Saeid et al. | 2014
- 151
-
Portability of an RF fingerprint of a wireless transmitterRehman, Saeed Ur / Sowerby, Kevin W. / Alam, Shafiq / Ardekani, Iman et al. | 2014
- 157
-
The drunk motorcyclist protocol for anonymous communicationYoung, Adam L. / Yung, Moti et al. | 2014
- 166
-
Modelling IP darkspace traffic by means of clustering techniquesIglesias, Felix / Zseby, Tanja et al. | 2014
- 175
-
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clientsAbdou, AbdelRahman M. / Matrawy, Ashraf / van Oorschot, Paul C. et al. | 2014
- 184
-
Analyzing the dangers posed by Chrome extensionsBauer, Lujo / Cai, Shaoying / Jia, Limin / Passaro, Timothy / Tian, Yuan et al. | 2014
- 193
-
Detecting smart, self-propagating Internet wormsLi, Jun / Stafford, Shad et al. | 2014
- 202
-
Location spoofing attack and its countermeasures in database-driven cognitive radio networksZeng, Kexiong / Kondaji Ramesh, Sreeraksha / Yang, Yaling et al. | 2014
- 211
-
Accurate rogue access point localization leveraging fine-grained channel informationZheng, Xiuyuan / Wang, Chen / Chen, Yingying / Yang, Jie et al. | 2014
- 220
-
Self-healing wireless networks under insider jamming attacksLi, Longquan / Zhu, Sencun / Torrieri, Don / Jajodia, Sushil et al. | 2014
- 229
-
NRE: Suppress Selective Forwarding attacks in Wireless Sensor NetworksCui, Biru / Yang, Shanchieh Jay et al. | 2014
- 238
-
CETAD: Detecting evil twin access point attacks in wireless hotspotsMustafa, Hossen / Xu, Wenyuan et al. | 2014
- 247
-
Towards effective feature selection in machine learning-based botnet detection approachesBiglar Beigi, Elaheh / Hadian Jazi, Hossein / Stakhanova, Natalia / Ghorbani, Ali A. et al. | 2014
- 256
-
Security configuration analytics using video gamesAlsaleh, Mohammed Noraden / Al-Shaer, Ehab Alsaleh et al. | 2014
- 265
-
An evasion and counter-evasion study in malicious websites detectionXu, Li / Zhan, Zhenxin / Xu, Shouhuai / Ye, Keying et al. | 2014
- 274
-
Exploiting altruism in social networks for friend-to-friend malware detectionProbst, Matthew J. / Park, Jun Cheol / Kasera, Sneha Kumar et al. | 2014
- 283
-
Chatter: Classifying malware families using system event orderingMohaisen, Aziz / West, Andrew G. / Mankin, Allison / Alrawi, Omar et al. | 2014
- 292
-
Two-tier data-driven intrusion detection for automatic generation control in smart gridAli, Muhammad Qasim / Yousefian, Reza / Al-Shaer, Ehab / Kamalasadan, Sukumar / Zhu, Quanyan et al. | 2014
- 301
-
Sensory channel threats to Cyber Physical Systems: A wake-up callUluagac, A. Selcuk / Subramanian, Venkatachalam / Beyah, Raheem et al. | 2014
- 310
-
iKUP keeps users' privacy in the Smart GridBorges, Fabio / Martucci, Leonardo A. et al. | 2014
- 319
-
Secret message sharing using online social mediaNing, Jianxia / Singh, Indrajeet / Madhyastha, Harsha V. / Krishnamurthy, Srikanth V. / Cao, Guohong / Mohapatra, Prasant et al. | 2014
- 328
-
VirtualFriendship: Hiding interactions on Online Social NetworksBeato, Filipe / Conti, Mauro / Preneel, Bart / Vettore, Dario et al. | 2014
- 337
-
A tale of two clouds: Computing on data encrypted under multiple keysWang, Boyang / Li, Ming / Chow, Sherman S. M. / Li, Hui et al. | 2014
- 346
-
Towards verifiable file search on the cloudChen, Fei / Xiang, Tao / Fu, Xinwen / Yu, Wei et al. | 2014
- 355
-
Enabling Trusted Data-intensive execution in cloud computingZhang, Ning / Lou, Wenjing / Jiang, Xuxian / Hou, Y. Thomas et al. | 2014
- 364
-
Integrity for distributed queriesDe Capitani di Vimercati, Sabrina / Foresti, Sara / Jajodia, Sushil / Livraga, Giovanni / Paraboschi, Stefano / Samarati, Pierangela et al. | 2014
- 373
-
Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacitiesPark, Young-Hoon / Lee, Eun-Dong / Seo, Seung-Woo et al. | 2014
- 382
-
An optimistic certified e-mail protocol for the current Internet e-mail architectureDraper-Gil, Gerard / Ferrer-Gomila, Josep L. / Francisca Hinarejos, M. / Tauber, Arne et al. | 2014
- 391
-
Attribute-based access control for ICN naming schemeLi, Bing / Prabhu Verleker, Ashwin / Huang, Dijiang / Wang, Zhijie / Zhu, Yan et al. | 2014
- 400
-
Mitigating Eclipse attacks in Peer-To-Peer networksGermanus, Daniel / Roos, Stefanie / Strufe, Thorsten / Suri, Neeraj et al. | 2014
- 409
-
Reroute on loop in anonymous peer-to-peer content sharing networksTian, Guanyu / Duan, Zhenhai / Baumeister, Todd / Dong, Yingfei et al. | 2014
- 418
-
Identifying global hot items in distributed dynamic data streamsChen, Wenji / Guan, Yong et al. | 2014
- 427
-
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networksKim, Yu Seung / Tian, Yuan / Nguyen, Le T. / Tague, Patrick et al. | 2014
- 436
-
TouchIn: Sightless two-factor authentication on multi-touch mobile devicesSun, Jingchao / Zhang, Rui / Zhang, Jinxue / Zhang, Yanchao et al. | 2014
- 445
-
MagPairing: Exploiting magnetometers for pairing smartphones in close proximityJin, Rong / Shi, Liu / Zeng, Kai / Pande, Amit / Mohapatra, Prasant et al. | 2014
- 454
-
Uncooperative localization improves attack performance in Underwater Acoustic NetworksLu, Xiaoyan / Zuba, Michael / Cui, Jun-Hong / Shi, Zhijie et al. | 2014
- 463
-
Multi-trapdoor hash functions and their applications in network securityChandrasekhar, Santosh / Singhal, Mukesh et al. | 2014
- 472
-
Manipulating the attacker's view of a system's attack surfaceAlbanese, Massimiliano / Battista, Ermanno / Jajodia, Sushil / Casola, Valentina et al. | 2014
- 481
-
A tunable proof of ownership scheme for deduplication using Bloom filtersBlasco, Jorge / Di Pietro, Roberto / Orfila, Agustin / Sorniotti, Alessandro et al. | 2014
- 490
-
Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behaviorStevanovic, Dusan / Vlajic, Natalija et al. | 2014
- 492
-
P2P networks monitoring based on the social network analysis and the topological potentialRen, Mengyin / Jiang, Yixin / Guo, Xiaobin / Han, Qiyi / Wen, Hong / Wu, Bin / Chen, Zhen et al. | 2014
- 494
-
Physical Layer Assist Mutual Authentication scheme for smart meter systemMa, Ting / Jiang, Yixin / Wen, Hong / Wu, Bin / Guo, Xiaobin / Chen, Zhen et al. | 2014
- 496
-
Radio frequency fingerprinting and its challengesRehman, Saeed Ur / Sowerby, Kevin W. / Alam, Shafiq / Ardekani, Iman et al. | 2014
- 498
-
DroidGraph: discovering Android malware by analyzing semantic behaviorKwon, Jonghoon / Jeong, Jihwan / Lee, Jehyun / Lee, Heejo et al. | 2014
- 500
-
A MIMO cross-layer precoding security communication systemTang, Jie / Song, Huan Huan / Pan, Fei / Wen, Hong / Wu, Bin / Jiang, Yixin / Guo, Xiaobin / Chen, Zhen et al. | 2014
- 502
-
Blind detection approach for LDPC, convolutional, and turbo codes in non-noisy environmentRefaey, Ahmed / Niati, Raheleh / Wang, Xianbin / Yves-Chouinard, Jean et al. | 2014
- 504
-
A multi-factor re-authentication framework with user privacyUluagac, A. Selcuk / Liu, Wenyi / Beyah, Raheem et al. | 2014
- 506
-
Approaches for vehicle cyber securityOnishi, Hiro et al. | 2014
- 508
-
Introducing asymmetric DC-NetsBorges, Fabio / Buchmann, Johannes / Muhlhauser, Max et al. | 2014
- 510
-
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communicationBraun, Johannes et al. | 2014
- 512
-
Towards time-varying classification based on traffic patternShao, Yiyang / Zhang, Luoshi / Chen, Xiaoxian / Xue, Yibo et al. | 2014
- 514
-
Physical integrity check in wireless relay networksKim, Sang Wu et al. | 2014
- 516
-
The Greenhouse Effect AttackMarchetta, Pietro / Persico, Valerio / Pescape, Antonio et al. | 2014
- 518
-
Location privacy for a quality of access to mobile Internet monitoring systemFont, Giselle / Bustos, Javier / Blasco, Sebastian / Hevia, Alejandro et al. | 2014
- 520
-
Detecting anomalies in DNS protocol traces via Passive Testing and Process MiningSaint-Pierre, Cecilia / Cifuentes, Francisco / Bustos-Jimenez, Javier et al. | 2014
- 522
-
Improving smart grid security using Merkle TreesMunoz, Melesio Calderon / Moh, Melody / Moh, Teng-Sheng et al. | 2014