Search for tag: "adversary"

SURF: Eavesdropping on Underwater Communications from the Air, Poorya Mollahosseini, GS (1B355730)

This project investigates how an airborne node…

+20 More
From  Research Princeton Research Day 0 likes 67 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are…

+28 More
From  Research Princeton Research Day 4 likes 89 plays

DeCenter Seminar Lecture: "Correctness Conditions for Cross-Chain Deals"

From  Broadcast Broadcast Center Staff 0 likes 8 plays

OURSIP Intern - Christopher Roberts

Vulnerabilities with mmWave Smart Surfaces …

+19 More
From  our Undergraduate Research 2 likes 31 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS…

+19 More
From  Research Princeton Research Day 0 likes 130 plays