Sciweavers

CCS
2006
ACM
14 years 3 months ago
Inferring the source of encrypted HTTP connections
Marc Liberatore, Brian Neil Levine
CCS
2006
ACM
14 years 3 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
CCS
2006
ACM
14 years 3 months ago
A natural language approach to automated cryptanalysis of two-time pads
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam ...
CCS
2006
ACM
14 years 3 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
CCS
2006
ACM
14 years 3 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters
CCS
2006
ACM
14 years 3 months ago
Forward-secure signatures with untrusted update
Xavier Boyen, Hovav Shacham, Emily Shen, Brent Wat...
CCS
2006
ACM
14 years 3 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CCS
2006
ACM
14 years 3 months ago
Fourth-factor authentication: somebody you know
John G. Brainard, Ari Juels, Ronald L. Rivest, Mic...
CCS
2006
ACM
14 years 3 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
CCS
2006
ACM
14 years 3 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...