Sciweavers

SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 1 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 1 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 1 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
SP
2006
IEEE
14 years 1 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
SP
2006
IEEE
129views Security Privacy» more  SP 2006»
14 years 1 months ago
Practical Inference Control for Data Cubes (Extended Abstract)
Yingjiu Li, Haibing Lu, Robert H. Deng
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 1 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
SP
2006
IEEE
108views Security Privacy» more  SP 2006»
14 years 1 months ago
Cache Cookies for Browser Authentication (Extended Abstract)
Ari Juels, Markus Jakobsson, Tom N. Jagatic
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 1 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
SP
2006
IEEE
136views Security Privacy» more  SP 2006»
14 years 1 months ago
Simulatable Security and Polynomially Bounded Concurrent Composability
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
Dennis Hofheinz, Dominique Unruh