Sciweavers

986 search results - page 6 / 198
» Protecting the Intranet Against
Sort
View
SAINT
2005
IEEE
14 years 1 months ago
A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails
Wide spread of spam mails is one of the most serious problems on e-mail environment. Particularly, spam mails with a spoofed sender address should not be left alone, since they ma...
Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashit...
DBSEC
2008
129views Database» more  DBSEC 2008»
13 years 9 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 8 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
MAS
1998
Springer
172views Communications» more  MAS 1998»
14 years 1 days ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
CSFW
2011
IEEE
12 years 7 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...