Zobrazeno 1 - 10
of 224
pro vyhledávání: '"Mauw, Sjouke"'
A Proof of Secure Erasure (PoSE) is a communication protocol where a verifier seeks evidence that a prover has erased its memory within the time frame of the protocol execution. Designers of PoSE protocols have long been aware that, if a prover can o
Externí odkaz:
http://arxiv.org/abs/2401.06626
This article addresses the problem of automatically generating attack trees that soundly and clearly describe the ways the system can be attacked. Soundness means that the attacks displayed by the attack tree are indeed attacks in the system; clarity
Externí odkaz:
http://arxiv.org/abs/2311.13331
The most prevalent smart card-based payment method, EMV, currently offers no privacy to its users. Transaction details and the card number are sent in cleartext, enabling the profiling and tracking of cardholders. Since public awareness of privacy is
Externí odkaz:
http://arxiv.org/abs/2309.03128
Message forwarding protocols are protocols in which a chain of agents handles transmission of a message. Each agent forwards the received message to the next agent in the chain. For example, TLS middleboxes act as intermediary agents in TLS, adding f
Externí odkaz:
http://arxiv.org/abs/2201.08686
To address known privacy problems with the EMV standard, EMVCo have proposed a Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future 2nd Gen EMV protocol. We point out that active attackers were not previously ac
Externí odkaz:
http://arxiv.org/abs/2105.02029
This paper addresses active re-identification attacks in the context of privacy-preserving social graph publication. Active attacks are those where the adversary can leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can
Externí odkaz:
http://arxiv.org/abs/2007.05312
Autor:
Torres, Christof Ferreira, Baden, Mathis, Norvill, Robert, Pontiveros, Beltran Borja Fiz, Jonker, Hugo, Mauw, Sjouke
In recent years, smart contracts have suffered major exploits, costing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified once deployed. Though various tools have been prop
Externí odkaz:
http://arxiv.org/abs/2003.05987