Using Purpose Capturing Signatures to Defeat Computer Virus Mutating (Englisch)
- Neue Suche nach: Jia, Xiaoqi
- Neue Suche nach: Xiong, Xi
- Neue Suche nach: Jing, Jiwu
- Neue Suche nach: Liu, Peng
- Neue Suche nach: Jia, Xiaoqi
- Neue Suche nach: Xiong, Xi
- Neue Suche nach: Jing, Jiwu
- Neue Suche nach: Liu, Peng
In:
Information Security, Practice and Experience
4
;
153-171
;
2010
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Using Purpose Capturing Signatures to Defeat Computer Virus Mutating
-
Beteiligte:Jia, Xiaoqi ( Autor:in ) / Xiong, Xi ( Autor:in ) / Jing, Jiwu ( Autor:in ) / Liu, Peng ( Autor:in )
-
Erschienen in:Information Security, Practice and Experience , 4 ; 153-171Lecture Notes in Computer Science ; 6047, 4 ; 153-171
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512Chen, Jiazhe / Jia, Keting et al. | 2010
- 19
-
Integral Attacks on Reduced-Round ARIA Block CipherLi, Yanjun / Wu, Wenling / Zhang, Lei et al. | 2010
- 30
-
A New Class of RC4 Colliding Key Pairs with Greater Hamming DistanceChen, Jiageng / Miyaji, Atsuko et al. | 2010
- 45
-
On the Security of NOEKEON against Side Channel Cube AttacksAbdul-Latip, Shekh Faisal / Reyhanitabar, Mohammad Reza / Susilo, Willy / Seberry, Jennifer et al. | 2010
- 56
-
On Fast and Approximate Attack Tree ComputationsJürgenson, Aivo / Willemson, Jan et al. | 2010
- 67
-
Width-3 Joint Sparse FormOkeya, Katsuyuki / Kato, Hidehiro / Nogami, Yasuyuki et al. | 2010
- 85
-
Accelerating Inverse of GF(2 n ) with PrecomputationLei, Xu / Dongdai, Lin et al. | 2010
- 96
-
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal BasisWang, Zhen / Wang, Xiaozhe / Fan, Shuqin et al. | 2010
- 110
-
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal GroupsYasuda, Masaya et al. | 2010
- 123
-
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of VariablesXu, Lin / Lin, Dongdai / Li, Xin et al. | 2010
- 138
-
Host-Based Security Sensor Integrity in Multiprocessing EnvironmentsMcEvoy, Thomas Richard / Wolthusen, Stephen D. et al. | 2010
- 153
-
Using Purpose Capturing Signatures to Defeat Computer Virus MutatingJia, Xiaoqi / Xiong, Xi / Jing, Jiwu / Liu, Peng et al. | 2010
- 172
-
Rate-Based Watermark Traceback: A New ApproachLiu, Zongbin / Jing, Jiwu / Liu, Peng et al. | 2010
- 187
-
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and WormholesFarhat, Farshid / Pakravan, Mohammad-Reza / Salmasizadeh, Mahmoud / Aref, Mohammad-Reza et al. | 2010
- 201
-
Security Analysis and Validation for Access Control in Multi-domain Environment Based on RiskTang, Zhuo / Zhang, Shaohua / Li, Kenli / Feng, Benming et al. | 2010
- 217
-
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),Hwang, Yu-na / Jeong, Hanjae / Cho, Sungkyu / Kim, Songyi / Won, Dongho / Kim, Seungjoo et al. | 2010
- 229
-
A Trustworthy ID Management Mechanism in Open MarketJeun, Inkyung / Won, Dongho et al. | 2010
- 241
-
BioID: Biometric-Based Identity ManagementHan, Byoung-Jin / Shin, Dong-Whi / Lim, Hyoung-Jin / Jeun, In-Kyung / Jung, Hyun-Chul et al. | 2010
- 251
-
Privacy Preserving of Trust Management Credentials Based on Trusted ComputingWu, Bin / Feng, Dengguo / Duan, Meijiao et al. | 2010
- 264
-
Mitigating the Malicious Trust Expansion in Social Network ServiceZha, Daren / Jing, Jiwu / Kang, Le et al. | 2010
- 276
-
An Efficient Convertible Undeniable Signature Scheme with Delegatable VerificationSchuldt, Jacob C. N. / Matsuura, Kanta et al. | 2010
- 294
-
Certificateless KEM and Hybrid Signcryption Schemes RevisitedSelvi, S. Sharmila Deva / Vivek, S. Sree / Rangan, C. Pandu et al. | 2010
- 308
-
A Deniable Group Key Establishment Protocol in the Standard ModelZhang, Yazhe / Wang, Kunpeng / Li, Bao et al. | 2010
- 324
-
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented SettingLi, Hui / Wu, Chuan-Kun / Wei, Lingbo et al. | 2010
- 341
-
Binary Image Steganographic Techniques Classification Based on Multi-class SteganalysisChiew, Kang Leng / Pieprzyk, Josef et al. | 2010
- 359
-
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty PuzzlesNarasimhan, Harikrishna / Varadarajan, Venkatanathan / Rangan, C. Pandu et al. | 2010
- 377
-
Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart CardsLee, Youngsook / Yang, Hyungkyu / Won, Dongho et al. | 2010
- 386
-
Protection Profile for Secure E-Voting SystemsLee, Kwangwoo / Lee, Yunho / Won, Dongho / Kim, Seungjoo et al. | 2010