Sciweavers

1019 search results - page 99 / 204
» Cryptographic Design Vulnerabilities
Sort
View
158
Voted
CSFW
2004
IEEE
15 years 7 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...
FPL
2008
Springer
112views Hardware» more  FPL 2008»
15 years 5 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
COMPSEC
2006
141views more  COMPSEC 2006»
15 years 4 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
110
Voted
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 3 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
IFIPTM
2009
149views Management» more  IFIPTM 2009»
15 years 1 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen