Sciweavers

149 search results - page 27 / 30
» Protection Mechanisms Against Phishing Attacks
Sort
View
MOBICOM
2004
ACM
14 years 13 days ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
DSN
2004
IEEE
13 years 10 months ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...
CCS
2011
ACM
12 years 7 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
HOST
2009
IEEE
13 years 11 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
CSREASAM
2006
13 years 8 months ago
Enhanced Group Key Generation Protocol
Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, th...
Sunghyuck Hong, Noé Lopez-Benitez