Sciweavers

1190 search results - page 156 / 238
» Secure off-the-record messaging
Sort
View
109
Voted
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
15 years 6 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
103
Voted
ISI
2007
Springer
15 years 6 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
98
Voted
OOPSLA
2007
Springer
15 years 6 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 6 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
90
Voted
SAC
2006
ACM
15 years 6 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...