Sciweavers

3482 search results - page 673 / 697
» Designing for security
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
NDSS
2008
IEEE
14 years 4 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
14 years 4 months ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...
NDSS
2007
IEEE
14 years 4 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 4 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang