Sciweavers

48 search results - page 3 / 10
» sec 2008
Sort
View
SEC
2008
13 years 6 months ago
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Privat
Every time a user uses the Internet, a wealth of personal information is revealed, either voluntarily or involuntarily. This often causes privacy breaches, specially if the informa...
Indrajit Ray, Sudip Chakraborty
SEC
2008
13 years 6 months ago
Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks
Abstract The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nationa...
Yngve Espelid, Lars-Helge Netland, André N....
SEC
2008
13 years 6 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
SEC
2008
13 years 6 months ago
An Operation-Based Metric for CPA Resistance
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-wei...
Jing Pan, J. I. den Hartog, Erik P. de Vink
SEC
2008
13 years 6 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...