-
3
-
-
84866382434
-
-
cth, schedule 3, Available at
-
Privacy act 1998, cth, schedule 3, 1998. Available at: http://www.privacy.gov.au/materials/types/infosheets/view/6583.
-
(1998)
Privacy Act 1998
-
-
-
4
-
-
84866417846
-
-
Amazon EC2 crosses the atlantic, 2008. http://aws.amazon.com/about-aws/ whats-new/2008/12/10/amazon-ec2-crosses-the-atlantic/.
-
(2008)
Amazon EC2 Crosses the Atlantic
-
-
-
5
-
-
81055144596
-
A note on a privacy-preserving distance-bounding protocol
-
Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, Information and Communications Security, Springer Berlin - Heidelberg
-
Jean-Philippe Aumasson, Aikaterini Mitrokotsa, and Pedro Peris-Lopez. A note on a privacy-preserving distance-bounding protocol. In Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, Information and Communications Security, volume 7043 of Lecture Notes in Computer Science, pages 78-92. Springer Berlin - Heidelberg, 2011.
-
(2011)
Lecture Notes in Computer Science
, vol.7043
, pp. 78-92
-
-
Aumasson, J.-P.1
Mitrokotsa, A.2
Peris-Lopez, P.3
-
6
-
-
80955142131
-
Do you know where your cloud files are?
-
New York, NY, USA, ACM
-
Karyn Benson, Rafael Dowsley, and Hovav Shacham. Do you know where your cloud files are? In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pages 73-82, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11
, pp. 73-82
-
-
Benson, K.1
Dowsley, R.2
Shacham, H.3
-
7
-
-
84976295016
-
Distance bounding protocols
-
Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT 93, Springer Berlin - Heidelberg
-
Stefan Brands and David Chaum. Distance bounding protocols. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT 93, volume 765 of Lecture Notes in Computer Science, pages 344-359. Springer Berlin - Heidelberg, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
10
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
12
-
-
80455157134
-
-
Available at
-
Cloud Security Alliance. Cloud controls matrix, 2010. Available at: www.cloudsecurityalliance.org.
-
(2010)
Cloud Controls Matrix
-
-
-
13
-
-
79959462113
-
Distance hijacking attacks on distance bounding protocols
-
Technical report, ePrint Archive: Report 2011/129
-
C. Cremers, K. Rasmussen, and S. Capkun. Distance hijacking attacks on distance bounding protocols. Technical report, Cryptology ePrint Archive: Report 2011/129, 2011.
-
(2011)
Cryptology
-
-
Cremers, C.1
Rasmussen, K.2
Capkun, S.3
-
14
-
-
79955670036
-
What is the future of disk drives, death or rebirth?
-
April
-
Yuhui Deng. What is the future of disk drives, death or rebirth? ACM Comput. Surv., 43:23:1-23:27, April 2011.
-
(2011)
ACM Comput. Surv.
, vol.43
-
-
Deng, Y.1
-
16
-
-
77952350344
-
Effectiveness of distance-decreasing attacks against impulse radio ranging
-
New York, NY, USA, ACM
-
Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. Effectiveness of distance-decreasing attacks against impulse radio ranging. In Proceedings of the third ACM conference on Wireless network security, WiSec '10, pages 117-128, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security, WiSec '10
, pp. 117-128
-
-
Flury, M.1
Poturalski, M.2
Papadimitratos, P.3
Hubaux, J.-P.4
Boudec, J.-Y.L.5
-
17
-
-
77954931916
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. The World Privacy Forum, 23:1-26, 2009.
-
(2009)
The World Privacy Forum
, vol.23
, pp. 1-26
-
-
Gellman, R.1
-
18
-
-
33847329743
-
An RFID distance bounding protocol
-
IEEE Computer Society Press
-
G. Hancke and M. Kuhn. An RFID distance bounding protocol. In IEEE/Create-Net SecureComm, pages 67-73. IEEE Computer Society Press, 2005.
-
(2005)
IEEE/Create-Net SecureComm
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
19
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
New York, NY, USA, ACM
-
Ari Juels and Burton S. Kaliski, Jr. PORs: proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 584-597, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
20
-
-
77956137294
-
Cryptographic cloud storage
-
Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography and Data Security, Springer Berlin / Heidelberg
-
Seny Kamara and Kristin Lauter. Cryptographic cloud storage. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography and Data Security, volume 6054 of Lecture Notes in Computer Science, pages 136-149. Springer Berlin / Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
21
-
-
78650125351
-
Optimal security limits of RFID distance bounding protocols
-
Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, Springer Berlin / Heidelberg
-
Orhun Kara, Süleyman Kardas, Muhammed Bingöl, and Gildas Avoine. Optimal security limits of RFID distance bounding protocols. In Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, volume 6370 of Lecture Notes in Computer Science, pages 220-238. Springer Berlin / Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6370
, pp. 220-238
-
-
Kara, O.1
Kardas, S.2
Bingöl, M.3
Avoine, G.4
-
23
-
-
34547469869
-
Towards ip geolocation using delay and topology measurements
-
New York, NY, USA, ACM
-
Ethan Katz-Bassett, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson, and Yatin Chawathe. Towards ip geolocation using delay and topology measurements. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, pages 71-84, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
, pp. 71-84
-
-
Katz-Bassett, E.1
John, J.P.2
Krishnamurthy, A.3
Wetherall, D.4
Anderson, T.5
Chawathe, Y.6
-
24
-
-
71549138804
-
RFID distance bounding protocol with mixed challenges to prevent relay attacks
-
Juan Garay, Atsuko Miyaji, and Akira Otsuka, editors, Cryptology and Network Security, Springer Berlin / Heidelberg
-
Chong Kim and Gildas Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In Juan Garay, Atsuko Miyaji, and Akira Otsuka, editors, Cryptology and Network Security, volume 5888 of Lecture Notes in Computer Science, pages 119-133. Springer Berlin / Heidelberg, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5888
, pp. 119-133
-
-
Kim, C.1
Avoine, G.2
-
25
-
-
67049155493
-
The swiss-knife RFID distance bounding protocol
-
Pil Lee and Jung Cheon, editors, Information Security and Cryptology ICISC 2008, Springer Berlin / Heidelberg
-
Chong Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The swiss-knife RFID distance bounding protocol. In Pil Lee and Jung Cheon, editors, Information Security and Cryptology ICISC 2008, volume 5461 of Lecture Notes in Computer Science, pages 98-115. Springer Berlin / Heidelberg, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5461
, pp. 98-115
-
-
Kim, C.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
27
-
-
0034836987
-
Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet
-
feb
-
Feng-Li Lian, J.R. Moyne, and D.M. Tilbury. Performance evaluation of control networks: Ethernet, ControlNet, and DeviceNet. Control Systems, IEEE, 21(1):66-83, feb 2001.
-
(2001)
Control Systems, IEEE
, vol.21
, Issue.1
, pp. 66-83
-
-
Lian, F.-L.1
Moyne, J.R.2
Tilbury, D.M.3
-
28
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
29
-
-
76749124932
-
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
-
february
-
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, and J.C. Hernandez-Castro. Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. Communications Letters, IEEE, 14(2):121-123, february 2010.
-
(2010)
Communications Letters, IEEE
, vol.14
, Issue.2
, pp. 121-123
-
-
Mitrokotsa, A.1
Dimitrakakis, C.2
Peris-Lopez, P.3
Hernandez-Castro, J.C.4
-
30
-
-
55349135872
-
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
-
Jorge Munilla and Alberto Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, 8(9):1227-1232, 2008.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.9
, pp. 1227-1232
-
-
Munilla, J.1
Peinado, A.2
-
31
-
-
79952275571
-
-
Nov Available at
-
European Network and information Security Agency (ENISA). Cloud computing information assurance framework, Nov 2009. Available at: http://www.enisa. europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance- framework.
-
(2009)
Cloud Computing Information Assurance Framework
-
-
-
36
-
-
77953892886
-
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
-
april
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M.E. Tapiador, E. Palomar, and J.C.A. van der Lubbe. Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security. In RFID, 2010 IEEE International Conference on, pages 45-52, april 2010.
-
(2010)
RFID, 2010 IEEE International Conference on
, pp. 45-52
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Palomar, E.4
Van Der Lubbe, J.C.A.5
-
39
-
-
34748825630
-
Detecting relay attacks with timing-based protocols
-
Feng Bao and Steven Miller, editors, Singapore, Association for Computing Machinery (ACM)
-
Jason F. Reid, Juan M. Gonzalez Nieto, Tee Tang, and Bouchra Senadji. Detecting relay attacks with timing-based protocols. In Feng Bao and Steven Miller, editors, ASIAN ACM Symposium on Information, Computer and Communications Security, pages 204-213, Singapore, 2007. Association for Computing Machinery (ACM).
-
(2007)
ASIAN ACM Symposium on Information, Computer and Communications Security
, pp. 204-213
-
-
Jason, F.1
Gonzalez Nieto, R.J.M.2
Tang, T.3
Senadji, B.4
-
40
-
-
38149028509
-
Distance bounding in noisy environments
-
Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks, Springer Berlin / Heidelberg
-
Dave Singelée and Bart Preneel. Distance bounding in noisy environments. In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, Security and Privacy in Ad-hoc and Sensor Networks, volume 4572 of Lecture Notes in Computer Science, pages 101-115. Springer Berlin / Heidelberg, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
41
-
-
4544319822
-
Scalable cooperative latency estimation
-
july
-
M. Szymaniak, G. Pierre, and M. van Steen. Scalable cooperative latency estimation. In Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on, pages 367-376, july 2004.
-
(2004)
Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on
, pp. 367-376
-
-
Szymaniak, M.1
Pierre, G.2
Van Steen, M.3
-
42
-
-
80052911841
-
Survey and analysis of disk scheduling methods
-
August
-
Alexander Thomasian. Survey and analysis of disk scheduling methods. SIGARCH Comput. Archit. News, 39:8-25, August 2011.
-
(2011)
SIGARCH Comput. Archit. News
, vol.39
, pp. 8-25
-
-
Thomasian, A.1
-
43
-
-
78650079491
-
The poulidor distance-bounding protocol
-
Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, Springer Berlin / Heidelberg
-
Rolando Trujillo-Rasua, Benjamin Martin, and Gildas Avoine. The poulidor distance-bounding protocol. In Siddika Ors Yalcin, editor, Radio Frequency Identification: Security and Privacy Issues, volume 6370 of Lecture Notes in Computer Science, pages 239-257. Springer Berlin / Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6370
, pp. 239-257
-
-
Trujillo-Rasua, R.1
Martin, B.2
Avoine, G.3
-
44
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Berlin, Heidelberg, Springer-Verlag
-
Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceedings of the 14th European conference on Research in computer security, ESORICS'09, pages 355-370, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security, ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
45
-
-
85094324868
-
Octant: A comprehensive framework for the geolocalization of internet hosts
-
B. Wong, I. Stoyanov, and E.G. Sirer. Octant: A comprehensive framework for the geolocalization of internet hosts. In Proceedings of the NSDI, volume 7, 2007.
-
(2007)
Proceedings of the NSDI
, vol.7
-
-
Wong, B.1
Stoyanov, I.2
Sirer, E.G.3
|