Sciweavers

1028 search results - page 40 / 103
» Using Attack Graphs to Design Systems
Sort
View
177 views 96 votes 16 years 1 months ago  CHI 2007»
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
192 views 124 votes 15 years 8 months ago  CCS 2009»
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
183 views 119 votes 15 years 6 months ago  RAID 2004»
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
108 views 134 votes 15 years 6 months ago  ASIACRYPT 2005»
Cryptosystems based on the knapsack problem were among the first public-key systems to be invented. Their high encryption/decryption rate attracted considerable interest until it ...
149 views 107 votes 16 years 2 months ago  DAC 2005»
In the design of highly complex, heterogeneous, and concurrent systems, deadlock detection and resolution remains an important issue. In this paper, we systematically analyze the ...
81 views 109 votes 15 years 7 months ago  ICSM 2007»
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
138 views 96 votes 16 years 2 months ago  WWW 2006»
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
115 views 121 votes 15 years 6 months ago  PET 2004»
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
107 views 158 votes 14 years 8 months ago  TIP 2010»
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
274 views 121 votes 15 years 8 months ago  CCS 2009»
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...