Sciweavers

CCS
2010
ACM
13 years 9 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ACSAC
2010
IEEE
13 years 9 months ago
SCOBA: source code based attestation on custom software
Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong ...
ACSAC
2010
IEEE
13 years 9 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
CSUR
2010
200views more  CSUR 2010»
13 years 9 months ago
Business process modeling languages: Sorting through the alphabet soup
Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric...
CSUR
2010
373views more  CSUR 2010»
13 years 9 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
CSUR
2010
124views more  CSUR 2010»
13 years 9 months ago
A taxonomy of sequential pattern mining algorithms
Nizar R. Mabroukeh, Christie I. Ezeife
CSSC
2010
121views more  CSSC 2010»
13 years 9 months ago
An Efficient Estimation for Switching Regression Models: A Monte Carlo Study
This paper investigates an efficient estimation method for a class of switching regressions based on the characteristic function (CF). We show that with the exponential weighting ...
Dinghai Xu
CSREASAM
2010
13 years 9 months ago
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
John Barker, Peter Hannay, Christopher Bolan
CSREASAM
2010
13 years 9 months ago
The 2010 IDN Homograph Attack Mitigation Survey
Peter Hannay, Christopher Bolan
CSREASAM
2010
13 years 9 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj