Sciweavers

1101 search results - page 54 / 221
» On the Security and Vulnerability of PING
Sort
View
ISSTA
2010
ACM
15 years 1 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
SDMW
2004
Springer
15 years 3 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
SEC
2007
14 years 11 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
IEEEARES
2006
IEEE
15 years 3 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
15 years 1 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann