Sciweavers

986 search results - page 31 / 198
» Protecting the Intranet Against
Sort
View
SOUPS
2006
ACM
14 years 3 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
NDSS
2003
IEEE
14 years 2 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
IH
1998
Springer
14 years 1 months ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
14 years 2 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
CSFW
2010
IEEE
14 years 1 months ago
On Protection by Layout Randomization
Abstract—Layout randomization is a powerful, popular technique for software protection. We present it and study it in programming-language terms. More specifically, we consider ...
Martín Abadi, Gordon D. Plotkin