Randy Baden
YOU?
Author Swipe
View article: Sharing Private Data Over Public Networks
Sharing Private Data Over Public Networks Open
Users share their sensitive personal data with each other through public services and applications provided by third parties. Users trust application providers with their private data since they want access to provided services. However, t…
View article: A Secure DHT via the Pigeonhole Principle
A Secure DHT via the Pigeonhole Principle Open
The standard Byzantine attack model assumes no more than some xed fraction of the participants are faulty. This assumption does not accurately apply to peer-to-peer settings, where Sybil attacks and botnets are realistic threats. We propos…