Sciweavers

78
Voted
SICHERHEIT
2008
15 years 1 months ago
Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner
Abstract: Benutzer von Anonymisierungsdiensten k
Hannes Federrath, Wolfgang Pöppel
83
Voted
SICHERHEIT
2008
15 years 1 months ago
Towards Self-Learning and Fully Transparent UCE Prevention
Wilfried N. Gansterer, Michael Ilger
80
Voted
SICHERHEIT
2008
15 years 1 months ago
ConCert: Content Revocation Using Certificates
: Content reuse on the Web is becoming even more common since the Web 2.0 "phenomenon". However, each time content is reused certain information is either completely lost...
Henrich Christopher Pöhls
79
Voted
SICHERHEIT
2008
15 years 1 months ago
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort
: Die Wirksamkeit von Intrusion Detection Systemen mit Signaturanalyse h
Sebastian Schmerl, René Rietz, Hartmut K&ou...
SICHERHEIT
2008
15 years 1 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling
98
Voted
SICHERHEIT
2008
15 years 1 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
94
Voted
SEC
2008
15 years 1 months ago
An Operation-Based Metric for CPA Resistance
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-wei...
Jing Pan, J. I. den Hartog, Erik P. de Vink
73
Voted
SEC
2008
15 years 1 months ago
Managing the lifecycle of XACML delegation policies in federated environments
Manuel Sánchez, Óscar Cánovas...
82
Voted
SEC
2008
15 years 1 months ago
A Decentralized Bayesian Attack Detection Algorithm for Network Security
Kien C. Nguyen, Tansu Alpcan, Tamer Basar