Sciweavers

CCS
2004
ACM
13 years 10 months ago
New client puzzle outsourcing techniques for DoS resistance
Brent Waters, Ari Juels, J. Alex Halderman, Edward...
CCS
2004
ACM
13 years 10 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
CCS
2004
ACM
13 years 10 months ago
A logic-based framework for attribute based access control
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
CCS
2004
ACM
13 years 10 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
CCS
2004
ACM
13 years 10 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CCS
2004
ACM
13 years 10 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
CCS
2004
ACM
13 years 10 months ago
On mutually-exclusive roles and separation of duty
Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara
CCS
2004
ACM
13 years 10 months ago
On the difficulty of scalably detecting network attacks
Kirill Levchenko, Ramamohan Paturi, George Varghes...
CCS
2004
ACM
13 years 10 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno