Sciweavers

3260 search results - page 542 / 652
» MYSEA Technology Demonstration
Sort
View
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 10 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
EMISA
2005
Springer
15 years 10 months ago
A Domain Engineering Approach to Specifying and Applying Reference Models
: Business process modeling and design, as an essential part of business process management, has gained much attention in recent years. An important tool for this purpose is refere...
Iris Reinhartz-Berger, Pnina Soffer, Arnon Sturm
FC
2005
Springer
133views Cryptology» more  FC 2005»
15 years 10 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
IH
2005
Springer
15 years 10 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
136
Voted
IH
2005
Springer
15 years 10 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...