Sciweavers

2503 search results - page 306 / 501
» Building Computer Network Attacks
Sort
View
NDSS
2002
IEEE
15 years 6 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
AINA
2008
IEEE
15 years 3 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
AINA
2007
IEEE
15 years 8 months ago
A Modular Architecture for Context Sensing
— Due to the technological evolution, context-aware computing is slowly moving from dream to reality. These applications heavily rely in sensing the user’s environment and ing ...
Julián Grigera, Andres Fortier, Gustavo Ros...
KIVS
1997
Springer
15 years 5 months ago
Conformance Testing of Objects in Distributed Processing Systems
The object model is a very popular paradigm for building distributed applications. Several standardisation efforts are underway that define architectures for distributed computing...
Brigitte Bär, Kurt Geihs
EUROPKI
2004
Springer
15 years 7 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith