Keyword: security

Found 180 papers in total
Secluded Connectivity Problems
2017,
Consider a setting where possibly sensitive information sent over a path in a network...
GOTCHA! Network-Based Fraud Detection for Social Security Fraud
2017,
We study the impact of network information for social security fraud detection. In a...
On the Information Ratio of Non-perfect Secret Sharing Schemes
2017,
A secret sharing scheme is non‐perfect if some subsets of players that cannot...
On Virtual Grey Box Obfuscation for General Circuits
2017,
An obfuscator O is Virtual Grey Box (VGB) for a class C of circuits if, for any C...
On the Impossibility of Cryptography with Tamperable Randomness
2017,
We initiate a study of the security of cryptographic primitives in the presence of...
Scalable Zero Knowledge Via Cycles of Elliptic Curves
2017,
Non‐interactive zero‐knowledge proofs of knowledge for general NP...
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
2017,
Random number generators (RNGs) play a crucial role in many cryptographic schemes and...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
2017,
In this work, we show how to use indistinguishability obfuscation to build multiparty...
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
2017,
A self‐bilinear map is a bilinear map where the domain and target groups are...
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
2017,
The notion of differing‐inputs obfuscation (diO) was introduced by Barak et al....
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training
2017,
We analyze the issue of agency costs in aviation security by combining results from a...
Algorithm for the N-2 Security-Constrained Unit Commitment Problem with Transmission Switching
2017,
Most power grid systems are operated to be N ‐1 secure, meaning that the system...
An adaptive and diversified vehicle routing approach to reducing the security risk of cash-in-transit operations
2017,
We consider the route optimization problem of transporting valuables in...
A simulation optimisation-based approach for team building in cyber security
2016,
In this study we present a simulation optimisation (SO) approach based on...
The Security‐Development Nexus in European Union Foreign Relations after Lisbon: Policy Coherence at Last?
2017,
One of the 2009 Lisbon Treaty's objectives was to enhance the coherence of...
Contagion in cyber security attacks
2017,
Systems security is essential for the efficient operation of all organizations....
The impact of network inhomogeneities on contagion and system stability
2017,
This work extends the contagion model introduced by Nier et al. (J Econ Dyn Control...
When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security
2016,
We study operational and managerial problems arising in the context of security...
When Is a Network Epidemic Hard to Eliminate?
2017,
We consider the propagation of a contagion process (‘epidemic’) on a...
Computing B-Stationary Points of Nonsmooth DC Programs
2017,
Motivated by a class of applied problems arising from physical layer based security in...
Patrolling a Border
2016,
Patrolling games were recently introduced to model the problem of protecting the nodes...
Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication*
2016,
Enterprises experience opportunistic exploits targeted at vulnerable technology....
Import Security: Assessing the Risks of Imported Food
2016,
We use data on food import violations from the FDA Operational and Administrative...
Radiological Risk Assessment by Convergence Methodology Model in RDD Scenarios
2016,
A radiological dispersal device (RDD) is a simple weapon capable of causing human...
Papers per page: