Sciweavers

11 search results - page 1 / 3
» Attacks on public WLAN-based positioning systems
Sort
View
MOBISYS
2009
ACM
14 years 9 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
TSE
2008
89views more  TSE 2008»
13 years 8 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
MSWIM
2006
ACM
14 years 2 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ESORICS
2012
Springer
11 years 11 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
ICIP
2005
IEEE
14 years 10 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern