Sciweavers

113 search results - page 4 / 23
» Attacks on physical-layer identification
Sort
View
TOIT
2008
92views more  TOIT 2008»
13 years 6 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
JNW
2008
118views more  JNW 2008»
13 years 4 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
SADFE
2008
IEEE
14 years 19 days ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
INFOCOM
2006
IEEE
14 years 9 days ago
Identification of Repeated Denial of Service Attacks
Alefiya Hussain, John S. Heidemann, Christos Papad...