Sciweavers

1294 search results - page 239 / 259
» Securing Against Insider Attacks
Sort
View
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 9 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 8 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ACSAC
2010
IEEE
13 years 7 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
FDTC
2010
Springer
138views Cryptology» more  FDTC 2010»
13 years 7 months ago
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Many implementations of cryptographic algorithms have shown to be susceptible to fault attacks. For some of them, countermeasures against specific fault models have been proposed. ...
Marcel Medwed, Jörn-Marc Schmidt
PET
2012
Springer
12 years 6 days ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...