Sciweavers

70 search results - page 4 / 14
» How Security Problems can Compromise Remote Internet Voting ...
Sort
View
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 2 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
ESORICS
2002
Springer
14 years 7 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
WETICE
1997
IEEE
13 years 12 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
EUROSYS
2010
ACM
14 years 26 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero