133
click to vote
SP
15 years 6 months ago
2003 IEEE
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
132
click to vote
SP
15 years 6 months ago
2003 IEEE
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
119
click to vote
SP
15 years 6 months ago
2003 IEEE
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
110
click to vote
SP
15 years 6 months ago
2003 IEEE
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
104
click to vote
SP
15 years 6 months ago
2003 IEEE
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
|