Sciweavers

158 search results - page 6 / 32
» Modeling and Preventing Phishing Attacks
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
ICEIS
2008
IEEE
14 years 1 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
13 years 11 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
OTM
2007
Springer
14 years 1 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
FC
2010
Springer
135views Cryptology» more  FC 2010»
13 years 11 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson