Sciweavers

1656 search results - page 143 / 332
» Secure Computation Without Authentication
Sort
View
CCS
2010
ACM
13 years 10 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...
JDCTA
2008
535views more  JDCTA 2008»
13 years 10 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 10 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
SACMAT
2003
ACM
14 years 3 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
DAC
2010
ACM
14 years 2 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic