Sciweavers

1770 search results - page 194 / 354
» Writing requirements in computer security
Sort
View
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
13 years 10 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
CCS
2007
ACM
14 years 5 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 4 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
IWCMC
2009
ACM
14 years 5 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
IEEEARES
2007
IEEE
14 years 5 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...