Sciweavers

986 search results - page 34 / 198
» Protecting the Intranet Against
Sort
View
CCS
2009
ACM
14 years 3 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SIGCSE
2008
ACM
166views Education» more  SIGCSE 2008»
13 years 9 months ago
Defense against the dark arts
Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These effort...
Mark W. Bailey, Clark L. Coleman, Jack W. Davidson
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
14 years 3 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...
WISEC
2010
ACM
14 years 4 months ago
Effectiveness of distance-decreasing attacks against impulse radio ranging
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer ...
Manuel Flury, Marcin Poturalski, Panos Papadimitra...
IPPS
2008
IEEE
14 years 3 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...