The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Securing a wireless channel between any two vehicles is a crucial component of vehicular networks security. This can be done by using a secret key to encrypt the messages. We propose a scheme to allow two cars to extract a shared secret from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same key. The key is information-theoretically secure, i.e.,...
The growing popularity of Android-based smart-phones have led to the rise of Android based malware. In particular, profit-motivated malware is becoming increasingly popular in Android malware distribution. These malware typically profit by sending premium-rate SMS messages and/or make premium-rate phone calls from infected devices without user consent. In this paper, we investigate the telephony framework...
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in measurable terms, what resources a the CSP will provide the user. CSP's being profit based companies have incentive to cheat on the SLA. By providing a user with less resources than...
Mobile social networks are vulnerable to Sybil attacks. By creating a large number of fake identities, malicious users can gain a disproportionately high benefit through a Byzantine fashion. Most social network-based Sybil defenses adopt the assumptions that the honest region is a fast-mixing network. However, more and more evidence shows that some real social networks are not fast-mixing, especially...
Remote obstetrics care monitoring is currently being used in many different countries to improve the quality of prenatal care, with promising results. The next generation of remote monitoring systems take advantage of improvements in wireless communications and mobile phone technologies to incorporate off-the-shelf equipment, such as Android smartphones, into their design. This not only reduces the...
Migrating applications with strong consistency requirements to public cloud platforms remains risky since the data owner cannot verify the correctness of the public cloud's locking algorithm. In this paper, we identify new attacks that an untrusted cloud provider can launch via control of the locking mechanism, and propose an extension to existing locking scheme to address such attacks. Our solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.