Search for tag: "adversary"

SURF: Eavesdropping on Underwater Communications from the Air, Poorya Mollahosseini, GS (1B355730)

This project investigates how an airborne node can eavesdrop on the underwater acoustic communication between submerged nodes. Conventionally, such eavesdropping has been assumed impossible as…

From  Research Princeton Research Day 0 likes 42 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 83 plays

DeCenter Seminar Lecture: "Correctness Conditions for Cross-Chain Deals"

From  Broadcast Broadcast Center Staff 0 likes 8 plays

OURSIP Intern - Christopher Roberts

Vulnerabilities with mmWave Smart Surfaces Mentors: Dr. Yasaman Ghasempour, ECE Haoze Chen, ECE

From  our Undergraduate Research 2 likes 28 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

From  Research Princeton Research Day 0 likes 122 plays