Learn More
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes have been proposed in recent years, most of them have no guarantee for direct key establishment, no resilience to a large number of node compromises, no resilience to dynamic(More)
Return-into-libc (RILC) is one of the most common forms of code-reuse attacks. In this attack, an intruder uses a buffer overflow or other exploit to redirect control flow through existing (libc) functions within the legitimate program. While dangerous, it is generally considered limited in its expressive power since it only allows the attacker to execute(More)
Internet advertising is one of the most popular online business models. JavaScript-based advertisements (ads) are often directly embedded in a web publisher's page to display ads relevant to users (e.g., by checking the user's browser environment and page content). However, as third-party code, the ads pose a significant threat to user privacy. Worse,(More)
JavaScript-based applications are very popular on the web today. However, the lack of effective protection makes various kinds of privacy violation attack possible, including cookie stealing, history sniffing and behavior tracking. There have been studies of the prevalence of such attacks, but the dynamic nature of the JavaScript language makes reasoning(More)
Video streaming is vital for many important applications such as distance learning, digital video libraries, and movie-on-demand. Since video streaming requires significant server and networking resources, caching has been used to reduce the demand on these resources. In this paper, we propose a novel collaboration scheme for video caching on overlay(More)
Communications in the wireless environments such as GSM, CDPD, 3G, and 4G are very popular. Therefore, it is necessary to have a secure authentication scheme to protect transactions between users and servers from illegal adversaries. Especially, users are people vulnerable to attacks and there are many authentication schemes with smart cards proposed to(More)
Recent years have seen a tremendous growth of interests in streaming continuous media such as video data over the Internet. This would create an enormous increase in the demand on various server and networking resources. To minimize service delays and to reduce loads placed on these resources, we propose an Overlay Caching Scheme (OCS) for overlay networks.(More)
Core-based routing with Quality of Service (QoS) support is essential to facilitate multi-sender multimedia multicast applications such as video conferencing and virtual collaboration applications. In this paper, we introduce a new distributed core selection protocol that has the following desirable properties. First, the protocol utilizes a new distributed(More)
Content distribution networks (CDNs) have been proposed to primarily distribute Web and some limited streaming audio/video content over the Internet. Current CDNs consist of fixed content nodes placed at strategic locations on the Internet to improve the service latency and to reduce server and network load. Although the approach of delivering content with(More)
In this paper, we consider the linear minimummean square error (LMMSE) estimation of channel for the two-way relay network employing analog network coding and orthogonal frequency division multiplexing. The channel responses required for self-interference cancelation and coherent detection are estimated in the time domain with the preamble. We derive the(More)