Sciweavers

302 search results - page 34 / 61
» Using Attack Injection to Discover New Vulnerabilities
Sort
View
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
14 years 1 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
SSDBM
2011
IEEE
234views Database» more  SSDBM 2011»
12 years 11 months ago
Privacy Preserving Group Linkage
The problem of privacy-preserving record linkage is to find the intersection of records from two parties, while not revealing any private records to each other. Recently, group li...
Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng ...
AAAI
2007
13 years 10 months ago
Unsupervised Shilling Detection for Collaborative Filtering
Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, the...
Bhaskar Mehta
USS
2010
13 years 5 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
IEEEARES
2009
IEEE
14 years 2 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...