Sciweavers

478 search results - page 73 / 96
» Secure Sockets Layer
Sort
View
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
13 years 11 months ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
EUROSEC
2008
ACM
13 years 9 months ago
Logging based IP Traceback in switched ethernets
IP Traceback systems facilitate tracing of IP packets back to their origin, despite possibly forged or overwritten source address data. A common shortcoming of existing proposals ...
Marios S. Andreou, Aad P. A. van Moorsel
BCSHCI
2007
13 years 9 months ago
A card-sorting probe of e-banking trust perceptions
This paper investigates the issue of trust mediation in eBanking. The card sorting technique was used to probe factors influencing subjects’ attitudes to alternative e-banking h...
Tim French, Kecheng Liu, Mark Springett
WISEC
2010
ACM
13 years 7 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight