Sciweavers

619 search results - page 105 / 124
» Learning with Security
Sort
View
DANCE
2002
IEEE
14 years 1 months ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ICIAR
2010
Springer
14 years 1 months ago
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable p...
Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aic...
OOPSLA
2009
Springer
14 years 1 months ago
An exploration of program as language
In this paper we explore the idea that the code that constitutes a program actually forms a higher-level, program specific language. The symbols of the language are the abstracti...
Elisa L. A. Baniassad, Clayton G. Myers
EUROCRYPT
1999
Springer
14 years 1 months ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...