Sciweavers

1663 search results - page 245 / 333
» Computer Security in the Real World
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
151
Voted
CPA
1995
143views Cryptology» more  CPA 1995»
15 years 7 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson
OOPSLA
1997
Springer
15 years 7 months ago
Efficient Type Inclusion Tests
A type inclusion test determines whether one type is a subtype of another. Efficient type testing techniques exist for single subtyping, but not for languages with multiple subtyp...
Jan Vitek, R. Nigel Horspool, Andreas Krall
CCS
2008
ACM
15 years 6 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
LAWEB
2009
IEEE
15 years 10 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...