Sciweavers

15379 search results - page 168 / 3076
» Protecting users from
Sort
View
COLCOM
2008
IEEE
13 years 9 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
SDMW
2004
Springer
14 years 1 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 1 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
SSDBM
2002
IEEE
100views Database» more  SSDBM 2002»
14 years 27 days ago
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...
Josep Domingo-Ferrer, Anna Oganian, Vicenç ...
SCN
2008
Springer
119views Communications» more  SCN 2008»
13 years 8 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...