Sciweavers

1294 search results - page 48 / 259
» Securing Against Insider Attacks
Sort
View
SOUPS
2005
ACM
15 years 4 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 5 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
RAID
1999
Springer
15 years 3 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
84
Voted
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 4 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 8 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta