Sciweavers

920 search results - page 70 / 184
» Selecting Secure Passwords
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Highlights from the 2005 New Security Paradigms Workshop
This panel highlights a selection of the most interesting and provocative papers from the 2005 New Security Paradigms Workshop. This workshop was held September 2005 - the URL for...
Simon N. Foley, Abe Singer, Michael E. Locasto, St...
ACSAC
2000
IEEE
14 years 2 months ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
IIHMSP
2006
IEEE
126views Multimedia» more  IIHMSP 2006»
14 years 3 months ago
Extending the Selective MPEG Encryption Algorithm PVEA
Currently, the requirements on MPEG encryption algorithms include: fast speed, format compliance, a wide range of security levels, easy implementation, etc. However, promising can...
Li Weng, Karel Wouters, Bart Preneel
EUROSEC
2010
ACM
14 years 4 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
CCS
2009
ACM
14 years 4 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson