Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
11 years 5 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
11 years 5 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
11 years 5 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
11 years 5 months ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
11 years 5 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
11 years 5 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
11 years 5 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis
books