Sciweavers

COMPSEC
2006
110views more  COMPSEC 2006»
14 years 15 days ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
COMPSEC
2006
141views more  COMPSEC 2006»
14 years 15 days ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
COMPSEC
2006
172views more  COMPSEC 2006»
14 years 15 days ago
A qualitative analysis of software security patterns
Spyros T. Halkidis, Alexander Chatzigeorgiou, Geor...
COMPSEC
2006
132views more  COMPSEC 2006»
14 years 15 days ago
Tightening the net: A review of current and next generation spam filtering tools
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The pap...
James Carpinter, Ray Hunt
COMPSEC
2006
90views more  COMPSEC 2006»
14 years 15 days ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
COMPSEC
2006
70views more  COMPSEC 2006»
14 years 15 days ago
Microsoft's new window on security
Danny Bradbury
COMPSEC
2006
98views more  COMPSEC 2006»
14 years 15 days ago
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert ...
COMPSEC
2006
98views more  COMPSEC 2006»
14 years 15 days ago
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user's login process. Recently, Yang et al., proposed an eff...
Kumar V. Mangipudi, Rajendra S. Katti
COMPSEC
2006
139views more  COMPSEC 2006»
14 years 15 days ago
Information Security - The Fourth Wave
Sebastiaan H. von Solms
COMPSEC
2006
78views more  COMPSEC 2006»
14 years 15 days ago
Efficient remote mutual authentication and key agreement
Wen-Gong Shieh, Jian-Min Wang