Sciweavers

352 search results - page 53 / 71
» Information Disclosure as a Means to Security
Sort
View
105
Voted
EUROSPI
2005
Springer
15 years 6 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
106
Voted
RAID
2005
Springer
15 years 6 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
104
Voted
ECAI
2004
Springer
15 years 6 months ago
An Active, Ontology-driven Network Service for Internet Collaboration
: Web portals have emerged as an important means of collaboration on the WWW, and the integration of ontologies promises to make them more accurate in how they serve users’ colla...
David Lewis, Kevin Feeney, Thanassis Tiropanis, Si...
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 4 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
87
Voted
USENIX
2001
15 years 1 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson