Sciweavers

5 search results - page 1 / 1
» On the Importance of Securing Your Bins: The Garbage-man-in-...
Sort
View
CCS
1997
ACM
13 years 10 months ago
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack
In this paper, we address the following problem: \ Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes. We exploit we...
Marc Joye, Jean-Jacques Quisquater
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
13 years 11 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
CCS
2009
ACM
14 years 1 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
ETRICS
2006
13 years 10 months ago
Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information...
Shyong K. Lam, Dan Frankowski, John Riedl
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 6 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani