Sciweavers

128 search results - page 22 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
SAC
2009
ACM
14 years 12 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
BMCBI
2010
156views more  BMCBI 2010»
13 years 7 months ago
Mathematical model for empirically optimizing large scale production of soluble protein domains
Background: Efficient dissection of large proteins into their structural domains is critical for high throughput proteome analysis. So far, no study has focused on mathematically ...
Eisuke Chikayama, Atsushi Kurotani, Takanori Tanak...