On the Secrecy of Spread-Spectrum Flow Watermarks (Englisch)
- Neue Suche nach: Luo, X.
- Neue Suche nach: Zhang, J.
- Neue Suche nach: Perdisci, R.
- Neue Suche nach: Lee, W.
- Neue Suche nach: Luo, X.
- Neue Suche nach: Zhang, J.
- Neue Suche nach: Perdisci, R.
- Neue Suche nach: Lee, W.
- Neue Suche nach: Gritzalis, Dimitris
- Neue Suche nach: Preneel, Bart
- Neue Suche nach: Theoharidou, Marianthi
In:
European Symposium on Research in Computer Security
6345
;
232-248
;
2010
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:On the Secrecy of Spread-Spectrum Flow Watermarks
-
Beteiligte:Luo, X. ( Autor:in ) / Zhang, J. ( Autor:in ) / Perdisci, R. ( Autor:in ) / Lee, W. ( Autor:in ) / Gritzalis, Dimitris / Preneel, Bart / Theoharidou, Marianthi
-
Kongress:15th, European Symposium on Research in Computer Security ; 2010 ; Athens, Greece
-
Erschienen in:European Symposium on Research in Computer Security , 6345 ; 232-248LECTURE NOTES IN COMPUTER SCIENCE , 6345 ; 232-248
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:17 pages
-
Anmerkungen:Includes bibliographical references and author index. Also issued online.
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A New Framework for RFID PrivacyDeng, R.H. / Li, Y. / Yung, M. / Zhao, Y. et al. | 2010
- 19
-
Readers Behaving Badly: Reader Revocation in PKI-Based RFID SystemsNithyanand, R. / Tsudik, G. / Uzun, E. et al. | 2010
- 37
-
Privacy-Preserving, Taxable Bank AccountsAndroulaki, E. / Vo, B. / Bellovin, S. et al. | 2010
- 55
-
Formal Analysis of Privacy for Vehicular Mix-ZonesDahl, M. / Delaune, S. / Steel, G. et al. | 2010
- 71
-
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-TimeZhang, C. / Wang, T. / Wei, T. / Chen, Y. / Zou, W. et al. | 2010
- 87
-
A Theory of Runtime Enforcement, with ResultsLigatti, J. / Reddy, S. et al. | 2010
- 101
-
Enforcing Secure Object Initialization in JavaHubert, L. / Jensen, T. / Monfort, V. / Pichardie, D. et al. | 2010
- 116
-
Flexible Scheduler-Independent SecurityMantel, H. / Sudbrock, H. et al. | 2010
- 134
-
Secure Multiparty Linear Programming Using Fixed-Point ArithmeticCatrina, O. / de Hoogh, S. et al. | 2010
- 151
-
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma -ProtocolsAlmeida, J.B. / Bangerter, E. / Barbosa, M. / Krenn, S. / Sadeghi, A.-R. / Schneider, T. et al. | 2010
- 168
-
Short Generic Transformation to Strongly Unforgeable Signature in the Standard ModelLiu, J.K. / Au, M.H. / Susilo, W. / Zhou, J. et al. | 2010
- 182
-
DR@FT: Efficient Remote Attestation Framework for Dynamic SystemsXu, W. / Ahn, G.-J. / Hu, H. / Zhang, X. / Seifert, J.-P. et al. | 2010
- 199
-
Website Fingerprinting and Identification Using Ordered Feature SequencesLu, L. / Chang, E.-C. / Chan, M.C. et al. | 2010
- 215
-
Web Browser History Detection as a Real-World Privacy ThreatJanc, A. / Olejnik, L. et al. | 2010
- 232
-
On the Secrecy of Spread-Spectrum Flow WatermarksLuo, X. / Zhang, J. / Perdisci, R. / Lee, W. et al. | 2010
- 249
-
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth EstimationChakravarty, S. / Stavrou, A. / Keromytis, A.D. et al. | 2010
- 268
-
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish DetectionXiang, G. / Pendleton, B.A. / Hong, J. / Rose, C.P. et al. | 2010
- 286
-
Kamouflage: Loss-Resistant Password ManagementBojinov, H. / Bursztein, E. / Boyen, X. / Boneh, D. et al. | 2010
- 303
-
Sequential Protocol Composition in Maude-NPAEscobar, S. / Meadows, C. / Meseguer, J. / Santiago, S. et al. | 2010
- 319
-
Verifying Security Property of Peer-to-Peer Systems Using CSPDinh, T.T.A. / Ryan, M. et al. | 2010
- 340
-
Modeling and Analyzing Security in the Presence of Compromising AdversariesBasin, D. / Cremers, C. et al. | 2010
- 357
-
On Bounding Problems of Quantitative Information FlowYasuoka, H. / Terauchi, T. et al. | 2010
- 373
-
On E-Vote Integrity in the Case of Malicious Voter ComputersHeiberg, S. / Lipmaa, H. / van Laenen, F. et al. | 2010
- 389
-
Election Verifiability in Electronic Voting ProtocolsKremer, S. / Ryan, M. / Smyth, B. et al. | 2010
- 405
-
Pretty Good Democracy for More Expressive Voting SchemesHeather, J. / Ryan, P.Y.A. / Teague, V. et al. | 2010
- 424
-
Efficient Multi-dimensional Key Management in Broadcast ServicesBlanton, M. / Frikken, K.B. et al. | 2010
- 441
-
Caught in the Maze of Security StandardsMeier, J. / Gollmann, D. et al. | 2010
- 455
-
User-Role Reachability Analysis of Evolving Administrative Role Based Access ControlGofman, M.I. / Luo, R. / Yang, P. et al. | 2010
- 472
-
An Authorization Framework Resilient to Policy Evaluation FailuresCrampton, J. / Huth, M. et al. | 2010
- 488
-
Optimistic Fair Exchange with Multiple ArbitersKupcu, A. / Lysyanskaya, A. et al. | 2010
- 508
-
Speaker Recognition in Encrypted Voice StreamsBackes, M. / Doychev, G. / Durmuth, M. / Kopf, B. et al. | 2010
- 524
-
Evaluating Adversarial PartitionsPashalidis, A. / Schiffner, S. et al. | 2010
- 540
-
Providing Mobile Users' Anonymity in Hybrid NetworksArdagna, C.A. / Jajodia, S. / Samarati, P. / Stavrou, A. et al. | 2010
- 558
-
Complexity of Anonymity for Security ProtocolsTiplea, F.L. / Vamanu, L. / Varlan, C. et al. | 2010
- 573
-
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown AttacksWang, L. / Jajodia, S. / Singhal, A. / Noel, S. et al. | 2010
- 588
-
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited InformationJohnson, B. / Grossklags, J. / Christin, N. / Chuang, J. et al. | 2010
- 607
-
RatFish: A File Sharing Protocol Provably Secure against Rational UsersBackes, M. / Ciobotaru, O. / Krohmer, A. et al. | 2010
- 626
-
A Service Dependency Model for Cost-Sensitive Intrusion ResponseKheir, N. / Cuppens-Boulahia, N. / Cuppens, F. / Debar, H. et al. | 2010
- 643
-
Secure Code Update for Embedded Devices via Proofs of Secure ErasurePerito, D. / Tsudik, G. et al. | 2010
- 663
-
D(e|i)aling with VoIP: Robust Prevention of DIAL AttacksKapravelos, A. / Polakis, I. / Athanasopoulos, E. / Ioannidis, S. / Markatos, E.P. et al. | 2010
- 679
-
Low-Cost Client Puzzles Based on Modular ExponentiationKarame, G.O. / Capkun, S. et al. | 2010
- 698
-
Expressive, Efficient and Obfuscation Resilient Behavior Based IDSTokhtabayev, A.G. / Skormin, V.A. / Dolgikh, A.M. et al. | 2010