Sciweavers

986 search results - page 162 / 198
» Protecting the Intranet Against
Sort
View
CORR
2011
Springer
197views Education» more  CORR 2011»
14 years 8 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
SSDBM
2011
IEEE
234views Database» more  SSDBM 2011»
14 years 8 months ago
Privacy Preserving Group Linkage
The problem of privacy-preserving record linkage is to find the intersection of records from two parties, while not revealing any private records to each other. Recently, group li...
Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng ...
155
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
162
Voted
CCS
2011
ACM
14 years 4 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
149
Voted
ESORICS
2011
Springer
14 years 4 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...