Sciweavers

1564 search results - page 71 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
MOC
2010
14 years 4 months ago
Sharpness in rates of convergence for the symmetric Lanczos method
The Lanczos method is often used to solve a large and sparse symmetric matrix eigenvalue problem. There is a well-established convergence theory that produces bounds to predict the...
Ren-Cang Li
DIMVA
2011
14 years 1 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
ESORICS
2011
Springer
13 years 9 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
INFOCOM
2012
IEEE
13 years 7 days ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,...
ESORICS
2012
Springer
13 years 5 days ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter