Sciweavers

2575 search results - page 467 / 515
» Providing security with insecure systems
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 6 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 6 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
APLAS
2009
ACM
15 years 6 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
DEBS
2009
ACM
15 years 6 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
IMC
2009
ACM
15 years 6 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...