Sciweavers

1294 search results - page 66 / 259
» Securing Against Insider Attacks
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 5 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
WISA
2005
Springer
15 years 9 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
CCS
2004
ACM
15 years 9 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno