Sciweavers

519 search results - page 56 / 104
» How to make secure email easier to use
Sort
View
CCS
2009
ACM
15 years 4 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 2 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
3DPH
2009
207views Healthcare» more  3DPH 2009»
14 years 10 months ago
A 3D Human Brain Atlas
3D representations of human physiology provide interesting options in the field of education. Understanding the human brain seems to be much easier when the anatomical structure is...
Sebastian Thelen, Jörg Meyer, Achim Ebert, Ha...
SCN
2010
Springer
138views Communications» more  SCN 2010»
14 years 8 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov