Spectral Techniques in Graph Algorithms
LATIN '98 Proceedings of the Third Latin American Symposium on Theoretical Informatics
Yaksha: augmenting Kerberos with public key cryptography
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Networked Cryptographic Devices Resilient to Capture
Networked Cryptographic Devices Resilient to Capture
Computing and applying trust in web-based social networks
Computing and applying trust in web-based social networks
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A Distributed Certification System for Structured P2P Networks
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
Enabling Secure Secret Sharing in Distributed Online Social Networks
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Hi-index | 0.00 |
The idea exploiting social networks for threshold signing was proposed to help average users better protect their private keys. In order to investigate the attack-resilience of the whole system, we propose a weight based attack strategy, which is more powerful than those previously proposed. We also investigate some important factors affecting the attack-resilience of the system, and based on the results, we propose a new design for delegate selection which can efficiently improve the attack-resilience of the whole system.