Sciweavers

CCS
2000
ACM
13 years 9 months ago
A secure execution framework for Java
Manfred Hauswirth, Clemens Kerer, Roman Kurmanowyt...
CCS
2000
ACM
13 years 9 months ago
Funkspiel schemes: an alternative to conventional tamper resistance
Johan Håstad, Jakob Jonsson, Ari Juels, Moti...
CCS
2000
ACM
13 years 9 months ago
An authorization model for temporal data
Avigdor Gal, Vijayalakshmi Atluri
CCS
2000
ACM
13 years 9 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
CCS
2000
ACM
13 years 9 months ago
Distribution chain security
Ø Ð ÓÒØ ÒØ ×ØÖ ÙØ ÓÒ ×Ý×Ø Ñ× Û ÐÐ Ò Ð Ù× Ò ×× ÑÓ ¹ Ð× Ò Ø Ò Ö ÙØÙÖ Ø Ø ÒÒÓØ ÔÖ Ø ØÓ Ýº ÁÒ Ø × Ô Ô Ö¸ Û ÒØ Ý Ò ...
Glenn Durfee, Matthew K. Franklin
CCS
2000
ACM
13 years 9 months ago
Using router stamping to identify the source of IP packets
Denial of Service and Distributed Denial of Service attacks have cost millions of dollars to online companies. Unfortunately, these attacks are particularly di cult to stop since ...
Thomas W. Doeppner, Philip N. Klein, Andrew Koyfma...
CCS
2000
ACM
13 years 9 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel
CCS
2000
ACM
13 years 9 months ago
Operating system enhancements to prevent the misuse of system calls
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...