Sciweavers

590 search results - page 91 / 118
» Security Issues in VOIP Applications
Sort
View
NDSS
2000
IEEE
13 years 11 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
EUROCRYPT
2009
Springer
14 years 8 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
ICSE
2008
IEEE-ACM
14 years 8 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
WWW
2004
ACM
14 years 8 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 8 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...