Sciweavers

1317 search results - page 21 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 5 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
CCS
2010
ACM
15 years 4 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
ACSAC
2006
IEEE
15 years 10 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
CCS
2008
ACM
15 years 6 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 4 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu