Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Joseph I. Choi"'
Autor:
Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong
Publikováno v:
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
Autor:
Washington Garcia, Animesh Chhotaray, Somesh Jha, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler
Publikováno v:
CODASPY
Authenticating a networked device relies on identifying its unique characteristics. Recent device fingerprinting proposals demonstrate that device activity, such as network traffic, can be used to extract features which identify devices using machine
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:2131-2143
The basis for all IPv4 network communication is the address resolution protocol (ARP), which maps an IP address to a device’s media access control identifier. ARP has long been recognized as vulnerable to spoofing and other attacks, and past propos
Autor:
Dave (Jing) Tian, Tyler Ward, Joseph I. Choi, Patrick Traynor, Tan F. Wong, John M. Shea, Kevin R. B. Butler
Publikováno v:
WiSec
In cooperative spectrum sensing, multiple sensors work together to perform tasks such as localizing a target transmitter. However, the exchange of spectrum measurements leads to exposure of the physical location of participating sensors. Furthermore,
Autor:
Kevin R. B. Butler, Christopher Patton, Thomas Shrimpton, Dave (Jing) Tian, Grant Hernandez, Benjamin Mood, Joseph I. Choi, Patrick Traynor
Publikováno v:
AsiaCCS
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8bc332ce09a06cb1b86e89c4f7e8b76e
http://arxiv.org/abs/1905.01233
http://arxiv.org/abs/1905.01233
Autor:
Vanessa Frost, Joseph I. Choi, Dave (Jing) Tian, Peter C. Johnson, Kevin R. B. Butler, Grant Hernandez
Publikováno v:
IEEE Symposium on Security and Privacy
Modern computer peripherals are diverse in their capabilities and functionality, ranging from keyboards and printers to smartphones and external GPUs. In recent years, peripherals increasingly connect over a small number of standardized communication
Publikováno v:
CODASPY
With close to native performance, Linux containers are becoming the de facto platform for cloud computing. While various solutions have been proposed to secure applications and containers in the cloud environment by leveraging Intel SGX, most cloud o
Autor:
Kevin R. B. Butler, Joseph I. Choi
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant
Autor:
Mohammad Mannan, Erman Ayday, Joseph I. Choi, Lianying Zhao, Jeremy Clark, Kevin R. B. Butler, Didem Demirag
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030321000
Financial Cryptography
Financial Cryptography
A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3c8797e1259d9c4f2ac87dd59f33d2b
https://doi.org/10.1007/978-3-030-32101-7_37
https://doi.org/10.1007/978-3-030-32101-7_37
Publikováno v:
MILCOM
Cooperative spectrum sensing is often necessary in cognitive radios systems to localize a transmitter by fusing the measurements from multiple sensing radios. However, revealing spectrum sensing information also generally leaks information about the