Sciweavers

631 search results - page 41 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
WPES
2004
ACM
15 years 7 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACSAC
2003
IEEE
15 years 6 months ago
S-ARP: a Secure Address Resolution Protocol
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution P...
Danilo Bruschi, A. Ornaghi, Emilia Rosti
NDSS
1998
IEEE
15 years 5 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
CSFW
2011
IEEE
14 years 1 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ICCV
2003
IEEE
16 years 3 months ago
Context-based vision system for place and object recognition
While navigating in an environment, a vision system has to be able to recognize where it is and what the main objects in the scene are. In this paper we present a contextbased vis...
Antonio B. Torralba, Kevin P. Murphy, William T. F...