نشرت في: February 2010
SQL injection attacks are one of the top-most threats for applications written for the Web. These attacks are launched through specially crafted user...
Payload attribution can be an important element in network forensics. Given a history of packet transmissions and an excerpt of a possible packet pay...
In this article, we propose a new voting protocol with several desirable security properties. The voting stage of the protocol can be performed by hum...
We consider the problem of authenticating a stream of packets transmitted over a network controlled by an adversary who may perform arbitrary attacks...
Mix-networks, a family of anonymous messaging protocols, have been engineered to withstand a wide range of theoretical internal and external adversar...