Sciweavers

13 search results - page 2 / 3
» spw 2005
Sort
View
SPW
2005
Springer
13 years 10 months ago
Listen Too Closely and You May Be Confused
Eric Cronin, Micah Sherr, Matt Blaze
SPW
2005
Springer
13 years 10 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
SPW
2005
Springer
13 years 10 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
SPW
2005
Springer
13 years 10 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
SPW
2005
Springer
13 years 10 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...