Sciweavers

499 search results - page 36 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICCSA
2005
Springer
15 years 6 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
98
Voted
ITRUST
2005
Springer
15 years 6 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
82
Voted
ACSAC
1999
IEEE
15 years 4 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
77
Voted
USS
2008
15 years 2 months ago
All Your iFRAMEs Point to Us
As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provi...
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu R...
BIOID
2008
190views Biometrics» more  BIOID 2008»
15 years 2 months ago
Direct Attacks Using Fake Images in Iris Verification
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...