Skip to main content

and
Your search also matched 90 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Adaptive Firefly Algorithm with a Modified Attractiveness Strategy

Include preview-only content
  1. Chapter and Conference Paper

    Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks

    We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These proto...

    Yongge Wang in Information Security and Privacy Research (2012)

  2. Chapter and Conference Paper

    RandHyp: Preventing Attacks via Xen Hypercall Interface

    Virtualization plays a key role in constructing cloud environments and providing services. Although the main jobs of the hypervisors are to guarantee proper isolation between domains and provide them services,...

    Feifei Wang, ** Chen, Bing Mao, Li **e in Information Security and Privacy Research (2012)

  3. Chapter and Conference Paper

    Modeling Social Engineering Botnet Dynamics across Multiple Social Networks

    In recent years, widely spreading botnets in social networks are becoming a major security threat to both social networking services and the privacy of their users. In order to have a better understanding of t...

    Shuhao Li, **aochun Yun, Zhiyu Hao in Information Security and Privacy Research (2012)

  4. Chapter and Conference Paper

    A Novel Chaining Approach to Indirect Control Transfer Instructions

    Both dynamic binary translation systems and optimization systems store the translated or optimized code in the software maintained code cache for reuse. The performance of the code cache is crucial. Translated...

    Wei Chen, Zhiying Wang, Qiang Dou in Availability, Reliability and Security for… (2011)

  5. Chapter and Conference Paper

    An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making

    The availability and reliability of large critical infrastructures depend on decisions made by hundreds or thousands of interdependent entities and, by extension, on the information that the entities exchange ...

    Yujue Wang, Carl Hauser in Critical Infrastructure Protection V (2011)

  6. Chapter and Conference Paper

    Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information

    In this work, we explore the benefits of combining clustering and social trust information for Recommender Systems. We demonstrate the performance advantages of traditional clustering algorithms like k-Means and ...

    Georgios Pitsilis, **angliang Zhang, Wei Wang in Trust Management V (2011)

  7. Chapter and Conference Paper

    To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data

    The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, however, has been impeded by privac...

    **aoyong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen in Computer Security – ESORICS 2011 (2011)

  8. Chapter and Conference Paper

    Linear Obfuscation to Combat Symbolic Execution

    Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious ...

    Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao in Computer Security – ESORICS 2011 (2011)

  9. Chapter and Conference Paper

    A Role-Involved Conditional Purpose-Based Access Control Model

    This paper presents a role-involved conditional purpose-based access control (RCPBAC) model, where a purpose is defined as the intension of data accesses or usages. RCPBAC allows users using some data for cert...

    Md. Enamul Kabir, Hua Wang, Elisa Bertino in E-Government, E-Services and Global Processes (2010)

  10. Chapter and Conference Paper

    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme

    The one-way function tree (OFT) scheme proposed by Balenson et al. is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. Following Horng’s claim that the ...

    Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu in Applied Cryptography and Network Security (2007)

  11. Chapter and Conference Paper

    A More Natural Way to Construct Identity-Based Identification Schemes

    Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a pub...

    Guomin Yang, **g Chen, Duncan S. Wong in Applied Cryptography and Network Security (2007)

  12. Chapter and Conference Paper

    An Improved Poly1305 MAC

    In this paper, we propose an improved Poly1305 MAC, called IPMAC. IPMAC is a refinement of Poly1305 MAC shown by Bernstein. We use only one 16-byte key and one 16-byte nonce for IPMAC while Poly1305 MAC uses t...

    Dayin Wang, Dongdai Lin, Wenling Wu in Applied Cryptography and Network Security (2006)

  13. Chapter and Conference Paper

    Real Perfect Contrast Visual Secret Sharing Schemes with Reversing

    The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlap** shadow images without additional computations. However, the contrast of r...

    Ching-Nung Yang, Chung-Chun Wang in Applied Cryptography and Network Security (2006)

  14. Chapter and Conference Paper

    Adaptive Detection of Local Scanners

    Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Existing scan detection schemes...

    Ahren Studer, Chenxi Wang in Applied Cryptography and Network Security (2006)