Sciweavers

1757 search results - page 175 / 352
» Secure Content Validation
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
120
Voted
COMPENG
2010
178views Algorithms» more  COMPENG 2010»
14 years 6 months ago
Online Distributed Interdependency Estimation with Partial Information Sharing
Infrastructures are becoming more and more interoperable, while stakeholders are not aware of the overall behavior. In order achieve a global awareness, in this paper the need for ...
Andrea Gasparri, Francesco Iovino, Gabriele Oliva,...
ISPEC
2011
Springer
14 years 2 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
PERCOM
2006
ACM
15 years 11 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
NORDSEC
2009
Springer
15 years 6 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski