Dates are inconsistent

Dates are inconsistent

1 results sorted by ID

Possible spell-corrected query: repeated stealth takeover
2012/103 (PDF) Last updated: 2012-02-29
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
Foundations

Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of "secret" keys that cryptographers assume in designing secure protocols. In this article, we introduce a game-theoretic framework for modeling various computer security scenarios prevalent...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.