• Publications
  • Influence
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same timeExpand
  • 962
  • 111
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network withExpand
  • 677
  • 81
  • PDF
Exploring steganography: Seeing the unseen
Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's veryExpand
  • 1,199
  • 75
  • PDF
LEAP: efficient security mechanisms for large-scale distributed sensor networks
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the sameExpand
  • 1,132
  • 74
  • PDF
Flexible support for multiple access control policies
Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specificExpand
  • 714
  • 36
  • PDF
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Twitter is a new web application playing dual roles of online social networking and microblogging. Users communicate with each other by publishing text-based posts. The popularity and open structureExpand
  • 394
  • 36
  • PDF
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet dropping, flow mixing, flowExpand
  • 232
  • 33
  • PDF
A logical language for expressing authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e. accesses toExpand
  • 511
  • 31
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularity and open structureExpand
  • 437
  • 31
  • PDF
Time Granularities in Databases, Data Mining, and Temporal Reasoning
From the Publisher: Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wideExpand
  • 278
  • 28
  • PDF