Sciweavers

1019 search results - page 147 / 204
» Cryptographic Design Vulnerabilities
Sort
View
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 5 months ago
Strategic Integration: A Knowledge Management Approach to Crisis Management
Every day, businesses are threatened by crises that could have been prevented or their impact lessened if only knowledge of causal and influencing factors were known and better ma...
Wei-Tsong Wang, Salvatore Belardo
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 5 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
ITCC
2005
IEEE
15 years 5 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
NDSS
2005
IEEE
15 years 5 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 5 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa