Sciweavers

25 search results - page 5 / 5
» A new protocol to counter online dictionary attacks
Sort
View
INFOCOM
2012
IEEE
12 years 6 days ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
14 years 3 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
DSN
2009
IEEE
14 years 4 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
JOC
2007
133views more  JOC 2007»
13 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ACSAC
2000
IEEE
14 years 2 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao