Sciweavers

NSPW
2003
ACM
13 years 9 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
NSPW
2003
ACM
13 years 9 months ago
Alliance formation for DDoS defense
Jelena Mirkovic, Max Robinson, Peter L. Reiher
NSPW
2003
ACM
13 years 9 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
NSPW
2003
ACM
13 years 9 months ago
Towards a new paradigm for securing wireless sensor networks
K. Jones, Ashraf Wadaa, Stephan Olariu, Larry Wils...
NSPW
2003
ACM
13 years 9 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
NSPW
2003
ACM
13 years 9 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
NSPW
2003
ACM
13 years 9 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...