Sciweavers

1294 search results - page 1 / 259
» Securing Against Insider Attacks
Sort
View
94
Voted
ACSAC
2001
IEEE
15 years 3 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
CIS
2005
Springer
15 years 5 months ago
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Jin Wook Byun, Dong Hoon Lee, Jongin Lim
60
Voted
ISJGP
2006
65views more  ISJGP 2006»
15 years 6 days ago
Securing Against Insider Attacks
David M. Lynch
99
Voted
CCS
2005
ACM
15 years 5 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ACSAC
2010
IEEE
14 years 10 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang