Sciweavers

796 search results - page 15 / 160
» Spoofing prevention method
Sort
View
WWW
2007
ACM
14 years 10 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
WISEC
2010
ACM
14 years 4 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
CCS
2009
ACM
14 years 10 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
EL
2011
86views more  EL 2011»
12 years 9 months ago
The use of metadata and preservation methods for continuous access to digital data
Data loss prevention starts with the creation of a digital object. However, methods to minimize the loss of digital data are often ignored, the use of metadata structures embedded...
Ria Groenewald, Amelia Breytenbach
MOC
1998
67views more  MOC 1998»
13 years 9 months ago
A negative-norm least squares method for Reissner-Mindlin plates
In this paper a least squares method, using the minus one norm developed by Bramble, Lazarov, and Pasciak, is introduced to approximate the solution of the Reissner-Mindlin plate p...
James H. Bramble, Tong Sun