Sciweavers

3504 search results - page 471 / 701
» Secure protocol composition
Sort
View
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
15 years 7 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
93
Voted
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
15 years 7 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
94
Voted
CLADE
2003
IEEE
15 years 7 months ago
Autonomic Optimization of an Oil Reservoir using Decentralized Services
The Grid community is actively working on defining, deploying and standardizing protocols, mechanisms, and infrastructure to support decentralized, seamless, and secure interacti...
Vincent Matossian, Manish Parashar
NCA
2003
IEEE
15 years 7 months ago
Admission Control in Peer Groups
Security in collaborative peer groups is an active research topic. Most previous work focused on key management without addressing an important pre-requisite: admission control, i...
Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
76
Voted
CCS
2001
ACM
15 years 6 months ago
Discouraging Software Piracy Using Software Aging
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We defin...
Markus Jakobsson, Michael K. Reiter