Sciweavers

13 search results - page 2 / 3
» Classifying RFID attacks and defenses
Sort
View
ICMCS
2005
IEEE
131views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Attacks and Forensic Analysis for Multimedia Content Protection
Piracy is one of the biggest concerns in entertainment industry. Digital copies are perfect copies. An anti-piracy defense is to perform forensic analysis and identify who partici...
Hongxia Jin, Jeffery Lotspiech
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
14 years 5 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
RFIDSEC
2010
13 years 9 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
SKG
2006
IEEE
14 years 4 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
INFOCOM
2009
IEEE
14 years 5 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...