Sciweavers

3452 search results - page 486 / 691
» Secure Data Outsourcing
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
CSFW
2009
IEEE
15 years 11 months ago
Policy Compliance in Collaborative Systems
When collaborating agents share sensitive information to achieve a common goal it would be helpful to them to decide whether doing so will lead to an unwanted release of confiden...
Max I. Kanovich, Paul Rowe, Andre Scedrov
SAINT
2009
IEEE
15 years 11 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 11 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
INFOCOM
2009
IEEE
15 years 11 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer