Sciweavers

726 search results - page 66 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...
PCM
2004
Springer
179views Multimedia» more  PCM 2004»
14 years 1 months ago
Digital Video Scrambling Method Using Intra Prediction Mode
Abstract. As the amount of digitalized contents increases rapidly, ‘security’ necessarily arises as one of the most important issues. The main distribution channel of digital c...
Jinhaeng Ahn, Hiuk Jae Shim, Byeungwoo Jeon, Incho...
PET
2009
Springer
14 years 2 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...