Sciweavers

729 search results - page 57 / 146
» Towards Secure e-Services
Sort
View
CN
1999
91views more  CN 1999»
13 years 8 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...
MOBIHOC
2005
ACM
14 years 8 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
HOTOS
1997
IEEE
14 years 1 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
DAC
2004
ACM
14 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
SOSP
2005
ACM
14 years 6 months ago
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...