Sciweavers

923 search results - page 102 / 185
» Improved Slide Attacks
Sort
View
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 10 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
SOUPS
2009
ACM
15 years 10 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
NOMS
2008
IEEE
120views Communications» more  NOMS 2008»
15 years 10 months ago
SGNET: Implementation insights
—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
Corrado Leita, Marc Dacier
SP
2008
IEEE
15 years 10 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Securing Cooperative Transmission in Wireless Communications
Abstract— Cooperative transmission is an emerging communication technique that takes advantages of spatial diversity and broadcast natures of wireless channels to improve wireles...
Zhu Han, Yan Lindsay Sun