Sciweavers

1019 search results - page 148 / 204
» Cryptographic Design Vulnerabilities
Sort
View
IPTPS
2005
Springer
15 years 5 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
PET
2005
Springer
15 years 5 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
EUROPKI
2004
Springer
15 years 5 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
15 years 5 months ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 5 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao