Sciweavers

495 search results - page 47 / 99
» MASC - Monitoring and Security of Containers
Sort
View
GCC
2005
Springer
15 years 6 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
ICICS
2001
Springer
15 years 5 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 1 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...
IDTRUST
2009
ACM
15 years 8 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 8 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....