Sciweavers

468 search results - page 60 / 94
» Security Weaknesses in Bluetooth
Sort
View
MOC
2010
13 years 3 months ago
Convergent finite element discretization of the multi-fluid nonstationary incompressible magnetohydrodynamics equations
Abstract. We propose a convergent implicit stabilized finite element discretization of the nonstationary incompressible magnetohydrodynamics equations with variable density, viscos...
Lubomír Bañas, Andreas Prohl
DIMVA
2011
13 years 9 days ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 2 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 8 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
WWW
2007
ACM
14 years 9 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks