Sciweavers

42 search results - page 7 / 9
» tissec 2008
Sort
View
TISSEC
2010
91views more  TISSEC 2010»
14 years 7 months ago
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TISSEC
2008
84views more  TISSEC 2008»
14 years 9 months ago
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu,...
TISSEC
2008
80views more  TISSEC 2008»
14 years 9 months ago
Controlled physical random functions and applications
Blaise Gassend, Marten van Dijk, Dwaine E. Clarke,...
TISSEC
2008
100views more  TISSEC 2008»
14 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
TISSEC
2002
82views more  TISSEC 2002»
14 years 9 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis