Sciweavers

358 search results - page 11 / 72
» Protecting Secret Data from Insider Attacks
Sort
View
71
Voted
ENTCS
2007
88views more  ENTCS 2007»
14 years 9 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
IH
2004
Springer
15 years 2 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
15 years 9 months ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
LCTRTS
2010
Springer
15 years 2 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul