Sciweavers

1294 search results - page 67 / 259
» Securing Against Insider Attacks
Sort
View
SASN
2006
ACM
15 years 10 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
CCGRID
2005
IEEE
15 years 10 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 10 months ago
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a...
Masashi Une, Akira Otsuka, Hideki Imai
SP
2003
IEEE
15 years 9 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
SCN
2008
Springer
15 years 4 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos