enter search term and/or author name
Providing Users’ Anonymity in Mobile Hybrid Networks
Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou
Article No.: 7
We present a novel hybrid communication protocol that guarantees mobile users’ anonymity against a wide-range of adversaries by exploiting the capability of handheld devices to connect to both WiFi and cellular networks. Unlike existing...
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
Ilung Pranata, Rukshan Athauda, Geoff Skinner
Article No.: 8
The advent of digital environments has generated significant benefits for businesses, organizations, governments, academia and societies in general. Today, over millions of transactions take place on the Internet. Although the widespread use of...
A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies
Lihua Yuan, Chao-Chih Chen, Prasant Mohapatra, Chen-Nee Chuah, Krishna Kant
Article No.: 9
The Domain Name System (DNS) provides a critical service for the Internet -- mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard set of metrics quantifying the Quality of Domain Name Service...