Sciweavers

358 search results - page 52 / 72
» Protecting Secret Data from Insider Attacks
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICST
2011
IEEE
14 years 1 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
14 years 9 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
SOCIALCOM
2010
14 years 7 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
VTC
2008
IEEE
117views Communications» more  VTC 2008»
15 years 3 months ago
Remote Medical Monitoring Through Vehicular Ad Hoc Network
Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension and etc. In order to m...
Hyduke Noshadi, Eugenio Giordano, Hagop Hagopian, ...