Sciweavers

95 search results - page 13 / 19
» Privacy is Not an Option: Attacking the IPv6 Privacy Extensi...
Sort
View
148
Voted
CCS
2006
ACM
15 years 5 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
JNCA
2011
123views more  JNCA 2011»
14 years 8 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
114
Voted
ACSAC
2008
IEEE
15 years 8 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
122
Voted
ACSAC
2008
IEEE
15 years 8 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 5 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson