Sciweavers

ISW
2009
Springer
14 years 6 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
ISW
2009
Springer
14 years 6 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
ISW
2009
Springer
14 years 6 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
ISW
2009
Springer
14 years 6 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
ISW
2009
Springer
14 years 6 months ago
A New Construction of Boolean Functions with Maximum Algebraic Immunity
Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
ISW
2009
Springer
14 years 6 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
ISW
2009
Springer
14 years 6 months ago
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
Jutta Hämmerle-Uhl, Elias Pschernig, Andreas ...
ISW
2009
Springer
14 years 6 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
ISW
2009
Springer
14 years 6 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
ISW
2009
Springer
14 years 6 months ago
Risks of the CardSpace Protocol
Sebastian Gajek, Jörg Schwenk, Michael Steine...