Secluded Connectivity Problems
Consider a setting where possibly sensitive information sent over a path in a network...
GOTCHA! Network-Based Fraud Detection for Social Security Fraud
We study the impact of network information for social security fraud detection. In a...
On the Information Ratio of Non-perfect Secret Sharing Schemes
A secret sharing scheme is non‐perfect if some subsets of players that cannot...
On Virtual Grey Box Obfuscation for General Circuits
An obfuscator O is Virtual Grey Box (VGB) for a class C of circuits if, for any C...
On the Impossibility of Cryptography with Tamperable Randomness
We initiate a study of the security of cryptographic primitives in the presence of...
Scalable Zero Knowledge Via Cycles of Elliptic Curves
Non‐interactive zero‐knowledge proofs of knowledge for general NP...
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
Random number generators (RNGs) play a crucial role in many cryptographic schemes and...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
In this work, we show how to use indistinguishability obfuscation to build multiparty...
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
A self‐bilinear map is a bilinear map where the domain and target groups are...
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
The notion of differing‐inputs obfuscation (diO) was introduced by Barak et al....
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training
We analyze the issue of agency costs in aviation security by combining results from a...
Algorithm for the N-2 Security-Constrained Unit Commitment Problem with Transmission Switching
Schumacher Kathryn M
Most power grid systems are operated to be N ‐1 secure, meaning that the system...
An adaptive and diversified vehicle routing approach to reducing the security risk of cash-in-transit operations
We consider the route optimization problem of transporting valuables in...
A simulation optimisation-based approach for team building in cyber security
In this study we present a simulation optimisation (SO) approach based on...
The Security‐Development Nexus in European Union Foreign Relations after Lisbon: Policy Coherence at Last?
One of the 2009 Lisbon Treaty's objectives was to enhance the coherence of...
Contagion in cyber security attacks
Systems security is essential for the efficient operation of all organizations....
The impact of network inhomogeneities on contagion and system stability
This work extends the contagion model introduced by Nier et al. (J Econ Dyn Control...
When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security
We study operational and managerial problems arising in the context of security...
When Is a Network Epidemic Hard to Eliminate?
We consider the propagation of a contagion process (‘epidemic’) on a...
Computing B-Stationary Points of Nonsmooth DC Programs
Motivated by a class of applied problems arising from physical layer based security in...
Patrolling a Border
Patrolling games were recently introduced to model the problem of protecting the nodes...
Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication*
Heim Gregory R
Enterprises experience opportunistic exploits targeted at vulnerable technology....
Import Security: Assessing the Risks of Imported Food
We use data on food import violations from the FDA Operational and Administrative...
Radiological Risk Assessment by Convergence Methodology Model in RDD Scenarios
Rother Fagner C
A radiological dispersal device (RDD) is a simple weapon capable of causing human...
Papers per page: