Skip to main content

Showing 1–2 of 2 results for author: Donoghue, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:1512.00102  [pdf, other

    cs.CR

    Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing

    Authors: David Zage, Helen Xu, Thomas Kroeger, Bridger Hahn, Nolan Donoghue, Thomas Benson

    Abstract: Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data pr… ▽ More

    Submitted 30 November, 2015; originally announced December 2015.

    Comments: 6 pages and 3 figures. Submitted and accepted at CNC at ICNC 2016

  2. arXiv:1511.09116  [pdf, other

    cs.CR cs.DB

    Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database

    Authors: Nolan Donoghue, Bridger Hahn, Helen Xu, Thomas Kroeger, David Zage, Rob Johnson

    Abstract: Access to network traffic records is an integral part of recognizing and addressing network security breaches. Even with the increasing sophistication of network attacks, basic network events such as connections between two IP addresses play an important role in any network defense. Given the duration of current attacks, long-term data archival is critical but typically very little of the data is… ▽ More

    Submitted 29 November, 2015; originally announced November 2015.

    Comments: 7 pages, 2 figures, 6 tables. Submitted and accepted to BADGERS 2015 at RAID 2015