Sciweavers

358 search results - page 20 / 72
» Protecting Secret Data from Insider Attacks
Sort
View
SASO
2007
IEEE
15 years 3 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
BIOSIG
2009
104views Biometrics» more  BIOSIG 2009»
14 years 7 months ago
A Note on the Protection Level of Biometric Data in Electronic Passports
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
Harald Baier, Tobias Straub
NDSS
2007
IEEE
15 years 3 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
CCS
2008
ACM
14 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
105
Voted
NETWORKING
2004
14 years 11 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar