Sciweavers

948 search results - page 124 / 190
» Attacking cryptographic schemes based on
Sort
View
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 2 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White
ICICS
2009
Springer
14 years 2 months ago
GUC-Secure Join Operator in Distributed Relational Database
Privacy-preserving SQL computation in distributed relational database is one of important applications of secure multiparty computation. In contrast with comparatively more works o...
Yuan Tian, Hao Zhang
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
14 years 10 days ago
Fractal Transform Based Large Digital Watermark Embedding and Robust Full Blind Extraction
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
Jean-Luc Dugelay, S. Roche
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 2 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang