Sciweavers

SICHERHEIT
2008
13 years 9 months ago
Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner
Abstract: Benutzer von Anonymisierungsdiensten k
Hannes Federrath, Wolfgang Pöppel
SICHERHEIT
2008
13 years 9 months ago
ConCert: Content Revocation Using Certificates
: Content reuse on the Web is becoming even more common since the Web 2.0 "phenomenon". However, each time content is reused certain information is either completely lost...
Henrich Christopher Pöhls
SICHERHEIT
2008
13 years 9 months ago
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort
: Die Wirksamkeit von Intrusion Detection Systemen mit Signaturanalyse h
Sebastian Schmerl, René Rietz, Hartmut K&ou...
SICHERHEIT
2008
13 years 9 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
SICHERHEIT
2008
13 years 9 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
SEC
2008
13 years 9 months ago
An Operation-Based Metric for CPA Resistance
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-wei...
Jing Pan, J. I. den Hartog, Erik P. de Vink