Sciweavers

EUROSEC
2010
ACM
14 years 2 months ago
AESSE: a cold-boot resistant implementation of AES
Tilo Müller, Andreas Dewald, Felix C. Freilin...
EUROSEC
2010
ACM
14 years 4 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
EUROSEC
2010
ACM
14 years 4 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
EUROSEC
2010
ACM
14 years 4 months ago
The robustness of a new CAPTCHA
CAPTCHA is a standard security technology that presents tests to tell computers and humans apart. In this paper, we examine the security of a new CAPTCHA that was deployed until v...
Ahmad Salah El Ahmad, Jeff Yan, Lindsay Marshall
EUROSEC
2010
ACM
14 years 6 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
EUROSEC
2010
ACM
14 years 6 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...