Search for tag: "adversary"
SURF: Eavesdropping on Underwater Communications from the Air, Poorya Mollahosseini, GS (1B355730)This project investigates how an airborne node can eavesdrop on the underwater acoustic communication between submerged nodes. Conventionally, such eavesdropping has been assumed impossible as…
From Research Princeton Research Day
0 likes
62 plays
|
|
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
89 plays
|
|
OURSIP Intern - Christopher RobertsVulnerabilities with mmWave Smart Surfaces Mentors: Dr. Yasaman Ghasempour, ECE Haoze Chen, ECE
From our Undergraduate Research
2 likes
29 plays
|
|
SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…
From Research Princeton Research Day
0 likes
126 plays
|