Diana K. Smetters

Learn More
Network use has evolved to be dominated by content distribution and retrieval, while networking technology still speaks only of connections between hosts. Accessing content and services requires mapping from the <i>what</i> that users care about to the network's <i>where</i>. We present <i>Content-Centric Networking</i> (CCN) which treats content as a(More)
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust between strangers. We present a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive(More)
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents – not even to other CIA servers. In this paper we first show how pairing-based cryptography can(More)
Spontaneous neuronal activity plays an important role in the development of cortical circuitry, yet its spatio-temporal dynamics are poorly understood. Cajal-Retzius (CR) neurons in developing layer 1 are necessary for correct cortical lamination and are strategically located to coordinate early circuit activity. To characterize the spontaneous activity of(More)
Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity. This is especially true in the presence of adversaries who might want to tamper with the audit logs. While it is important that auditors can inspect audit logs to assess past system activity, the(More)
Central neurons are subject to a tonic barrage of randomly occurring spontaneous inhibitory events (mIP-SCs) resulting from the action potential-independent release of gamma-aminobutyric acid (GABA). Do the terminals making synapses onto somatic versus dendritic sites, which arise from specific populations of interneurons, differ in their ability to(More)
Current networks derive their security from a communication model. The security of content is determined by who (what host) you retrieved that content from, and the properties of the communication channel over which you retrieved it -was it encrypted, authenticated, and so on. Such security is transient, evaporating after the connection ends, and not(More)
Recent results from usability studies of security systems have shown that end-users find them difficult to adopt and use. In this paper we argue that improving the usability of security technology is only one part of the problem, and that what is missed is the need to design usable and useful systems that provide security to end-users in terms of the(More)
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users actually create in practice. We used(More)