Sciweavers

986 search results - page 15 / 198
» Protecting the Intranet Against
Sort
View
68
Voted
CEAS
2008
Springer
14 years 11 months ago
Breaking out of the Browser to Defend Against Phishing Attacks
Current approaches to phishing prevention are focused on the web browser and the user's interaction with it. We present a new approach to allowing users to interact reliably ...
Diana K. Smetters, Paul Stewart
76
Voted
SIGIR
2003
ACM
15 years 2 months ago
Analysis of anchor text for web search
It has been observed that anchor text in web documents is very useful in improving the quality of web text search for some classes of queries. By examining properties of anchor te...
Nadav Eiron, Kevin S. McCurley
73
Voted
IWIA
2005
IEEE
15 years 3 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
66
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie
86
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 9 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux