Sciweavers

381 search results - page 48 / 77
» Timing attacks on Web privacy
Sort
View
EJWCN
2010
118views more  EJWCN 2010»
13 years 2 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
ICALT
2005
IEEE
14 years 1 months ago
Learning from the Pitfalls of a Case Sharing Web
Using cases for teaching and learning has received growing attention in teacher training programs. This project intends to build a web forum for student teachers to discuss their ...
Shihkuan Hsu
ACSAC
2009
IEEE
14 years 2 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
SOUPS
2009
ACM
14 years 2 months ago
Serial hook-ups: a comparative usability study of secure device pairing methods
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless ...
Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin ...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 2 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar