Sciweavers

10 search results - page 2 / 2
» sicherheit 2008
Sort
View
SICHERHEIT
2008
13 years 6 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
SICHERHEIT
2008
13 years 6 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
SICHERHEIT
2008
13 years 6 months ago
Implications of the EU Data Retention Directive 2006/24/EC
: The strongly discussed EU Data Retention directive 2006/24/EC released in 2006 requires the operators of publicly accessible electronic communication networks to retain traffic a...
Gerald Stampfel, Wilfried N. Gansterer, Martin Ilg...
SICHERHEIT
2008
13 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
SICHERHEIT
2008
13 years 6 months ago
ConCert: Content Revocation Using Certificates
: Content reuse on the Web is becoming even more common since the Web 2.0 "phenomenon". However, each time content is reused certain information is either completely lost...
Henrich Christopher Pöhls