Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2008
Authenticated hash tables
CCS '08: Proceedings of the 15th ACM conference on Computer and communications securityPages 437–448https://doi.org/10.1145/1455770.1455826Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating ...
- research-articleOctober 2008
Information leaks in structured peer-to-peer anonymous communication systems
CCS '08: Proceedings of the 15th ACM conference on Computer and communications securityPages 267–278https://doi.org/10.1145/1455770.1455805We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show that the techniques that are used to combat active attacks on the lookup ...
- research-articleOctober 2008
Location privacy of distance bounding protocols
CCS '08: Proceedings of the 15th ACM conference on Computer and communications securityPages 149–160https://doi.org/10.1145/1455770.1455791Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As such, distance bounding protocols are executed frequently, e.g., to keep ...