Sciweavers

369 search results - page 6 / 74
» Security Attack Testing (SAT) - testing the security of info...
Sort
View
CCS
2004
ACM
14 years 2 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
IEEEIAS
2008
IEEE
14 years 3 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
PDPTA
2000
13 years 10 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
CCS
2009
ACM
14 years 3 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
JNW
2008
126views more  JNW 2008»
13 years 8 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe