Sciweavers

654 search results - page 110 / 131
» Privacy protection for RFID data
Sort
View
DRMTICS
2005
Springer
15 years 3 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
SP
2003
IEEE
15 years 3 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
CCS
2003
ACM
15 years 3 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
15 years 3 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ACSAC
2000
IEEE
15 years 2 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...