Sciweavers

796 search results - page 4 / 160
» Spoofing prevention method
Sort
View
JSAC
2006
105views more  JSAC 2006»
13 years 9 months ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song
SOUPS
2005
ACM
14 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 7 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
ICB
2009
Springer
122views Biometrics» more  ICB 2009»
14 years 4 months ago
A New Fake Iris Detection Method
Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
XiaoFu He, Yue Lu, Pengfei Shi
ICISS
2007
Springer
14 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...