Sciweavers

731 search results - page 62 / 147
» Special Section on Information and Communication System Secu...
Sort
View
WMCSA
2008
IEEE
14 years 3 months ago
Making CAPTCHAs clickable
We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minim...
Richard Chow, Philippe Golle, Markus Jakobsson, Lu...
CCS
2009
ACM
14 years 3 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
ICDCS
2006
IEEE
14 years 3 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 3 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
WORM
2004
13 years 10 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu