Share This Author
LEAP: efficient security mechanisms for large-scale distributed sensor networks
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same…
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
The security of LEAP+ under various attack models is analyzed and it is shown that it is very effective in defending against many sophisticated attacks, such as HELLO flood attacks, node cloning attacks, and wormhole attacks.
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
- Sencun Zhu, Sanjeev Setia, S. Jajodia, P. Ning
- Computer ScienceIEEE Symposium on Security and Privacy…
- 9 May 2004
This paper presents an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised.
Exploring steganography: Seeing the unseen
It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
- Zi Chu, Steven Gianvecchio, Haining Wang, S. Jajodia
- Computer ScienceIEEE Transactions on Dependable and Secure…
- 1 November 2012
This paper conducts a set of large-scale measurements with a collection of over 500,000 accounts and proposes a classification system that uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot, or cyborg on Twitter.
Flexible support for multiple access control policies
A unified framework that can enforce multiple access control policies within a single system and be enforced by the same security server is presented, based on a language through which users can specify security policies to be enforced on specific accesses.
Who is tweeting on Twitter: human, bot, or cyborg?
This paper proposes a classification system that uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot or cyborg on Twitter and demonstrates the efficacy of the proposed classification system.
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
- Xinyuan Wang, Shiping Chen, S. Jajodia
- Computer ScienceIEEE Symposium on Security and Privacy (SP '07)
- 20 May 2007
The fundamental limitations of flow transformations in achieving anonymity are investigated, and it is shown that flow transformations do not necessarily provide the level of anonymity people have expected or believed, and current flow transformation based low-latency anonymous communication systems need to be revisited.
A logical language for expressing authorizations
- S. Jajodia, P. Samarati, V. S. Subrahmanian
- Computer ScienceProceedings. IEEE Symposium on Security and…
- 4 May 1997
This paper proposes a logical language for the specification of authorizations and illustrates the power of the language by showing how different constraints that are sometimes required, but very seldom supported by existing access control systems, can be represented in the language.
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats
- S. Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff X. Wang, X. S. Wang
- Computer ScienceMoving Target Defense
- 30 September 2011
The fundamental challenges facing the research community are described and new promising solution paths are identified and an advantage afforded to attackers is reversed and reverses it to advantage defenders.