Sciweavers

CCS
2005
ACM
14 years 5 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
WISA
2005
Springer
14 years 5 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
WISA
2005
Springer
14 years 5 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
WISA
2005
Springer
14 years 5 months ago
Key Factors Influencing Worm Infection in Enterprise Networks
Urupoj Kanlayasiri, Surasak Sanguanpong
WISA
2005
Springer
14 years 5 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...
WISA
2005
Springer
14 years 5 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
WISA
2005
Springer
14 years 5 months ago
Oblivious Conjunctive Keyword Search
Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jong...
TRUSTBUS
2005
Springer
14 years 5 months ago
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Abstract. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and t...
Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
TRUSTBUS
2005
Springer
14 years 5 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
TRUSTBUS
2005
Springer
14 years 5 months ago
An Adaptive Privacy Management System for Data Repositories
Marco Casassa Mont, Siani Pearson