Sciweavers

1949 search results - page 131 / 390
» Protective Interface Specifications
Sort
View
COMCOM
2006
75views more  COMCOM 2006»
15 years 1 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
94
Voted
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 1 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 1 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
JCM
2007
80views more  JCM 2007»
15 years 1 months ago
On the Impact of Security on the Performance of WLANs
— This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used ...
Ezedin Barka, Mohammed Boulmalf
VIROLOGY
2008
95views more  VIROLOGY 2008»
15 years 1 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns