Sciweavers

222 search results - page 35 / 45
» A Privacy Preserving Rental System
Sort
View
CCS
2008
ACM
13 years 9 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
ICCNMC
2005
Springer
14 years 1 months ago
DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing
The emergence of Internet, Intranet, local area networks, and ad hoc wireless networks introduces a plethora of new problems in information processing. In order to overcome these p...
Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu,...
USENIX
2000
13 years 9 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
CSFW
2008
IEEE
14 years 2 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
ACSAC
2006
IEEE
14 years 1 months ago
Back to the Future: A Framework for Automatic Malware Removal and System Repair
Malware is software with malicious intent. Besides viruses and worms, spyware, adware, and other newer forms of malware have recently emerged as widely-spread threats to system se...
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li...