Sciweavers

912 search results - page 27 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
NDSS
1998
IEEE
15 years 1 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
RAID
2010
Springer
14 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
CCS
2005
ACM
15 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ASWEC
2006
IEEE
15 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...