Sciweavers

461 search results - page 29 / 93
» Protecting Transportation Infrastructure
Sort
View
ACSW
2006
13 years 11 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
SIGCOMM
2010
ACM
13 years 10 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
CCR
2002
92views more  CCR 2002»
13 years 9 months ago
Controlling high bandwidth aggregates in the network
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated ...
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, Jo...
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
14 years 3 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
FC
2007
Springer
141views Cryptology» more  FC 2007»
14 years 4 months ago
The Unbearable Lightness of PIN Cracking
Responding to the PIN cracking attacks from Berkman and Ostrovsky (FC 2007), we outline a simple solution called salted-PIN. A randomly generated salt value of adequate length (e.g...
Omer Berkman, Odelia Moshe Ostrovsky