Sciweavers

SEC
2007
13 years 6 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
SEC
2007
13 years 6 months ago
Security Remarks on a Convertible Nominative Signature Scheme
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee ...
Guilin Wang, Feng Bao
SEC
2007
13 years 6 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
SEC
2007
13 years 6 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
SEC
2007
13 years 6 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat
SEC
2007
13 years 6 months ago
Usability and Security of Personal Firewalls
Almut Herzog, Nahid Shahmehri
SEC
2007
13 years 6 months ago
Phishing in the Wireless: Implementation and Analysis
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, ...
SEC
2007
13 years 6 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
SEC
2007
13 years 6 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
SEC
2007
13 years 6 months ago
Crafting Web Counters into Covert Channels
We present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder ...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang