Sciweavers

619 search results - page 80 / 124
» Learning with Security
Sort
View
SP
2009
IEEE
14 years 3 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
ACSAC
2008
IEEE
14 years 3 months ago
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint
In February 2002, more than 50 leaders in the information assurance field warned the President of the United States of a national strategic vulnerability in the country’s inform...
O. Sami Saydjari
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
14 years 3 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
IPCCC
2007
IEEE
14 years 3 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
SOUPS
2006
ACM
14 years 2 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little