Sciweavers

CMS
2010
150views Communications» more  CMS 2010»
14 years 9 days ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
CMS
2010
149views Communications» more  CMS 2010»
14 years 9 days ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
CMS
2010
207views Communications» more  CMS 2010»
14 years 9 days ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
CMS
2010
118views Communications» more  CMS 2010»
14 years 9 days ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
CMS
1996
167views Communications» more  CMS 1996»
14 years 1 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan
CMS
2003
120views Communications» more  CMS 2003»
14 years 1 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
CMS
2003
104views Communications» more  CMS 2003»
14 years 1 months ago
Privacy and Trust in Distributed Networks
Thomas Rössler, Arno Hollosi
CMS
2003
14 years 1 months ago
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression
David Megías, Jordi Herrera-Joancomart&iacu...
CMS
2003
148views Communications» more  CMS 2003»
14 years 1 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling