Sciweavers

4413 search results - page 745 / 883
» Security for biometric data
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
112
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 3 months ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania
145
Voted
ENTCS
2008
136views more  ENTCS 2008»
15 years 3 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
127
Voted
CN
2006
87views more  CN 2006»
15 years 3 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
135
Voted
CN
2006
83views more  CN 2006»
15 years 3 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...