Sciweavers

CCS
1999
ACM
13 years 11 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
CCS
1999
ACM
13 years 11 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate userā€™s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel
CCS
1999
ACM
13 years 11 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite eļ¬ƒcient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
CCS
1999
ACM
13 years 11 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks ā€” including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
CCS
1999
ACM
13 years 11 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss