Sciweavers

180 search results - page 5 / 36
» Modular Protections against Non-control Data Attacks
Sort
View
IEAAIE
2007
Springer
14 years 5 months ago
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection
With the exponential growth of digital materials in this age, the protection of Intellectual Property Right (IPR) becomes an important and urgent topic. In this paper, we propose a...
Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Ch...
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
ADHOC
2008
132views more  ADHOC 2008»
13 years 11 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
SAC
2009
ACM
14 years 3 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
ISW
2010
Springer
13 years 9 months ago
An Analysis of DepenDNS
Recently, a new scheme to protect clients against DNS cache poisoning attacks was introduced. The scheme is referred to as DepenDNS and is intended to protect clients against such ...
Nadhem J. AlFardan, Kenneth G. Paterson