GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Collection

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
Search 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Sicherheit
  • P170 - Sicherheit 2010 - Sicherheit, Schutz und Zuverlässigkeit
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Sicherheit
  • P170 - Sicherheit 2010 - Sicherheit, Schutz und Zuverlässigkeit
  • Search

Search

DiscoverDiscover

Filters

Use filters to refine the search results.

Now showing items 1-10 of 31

Results Per Page:Sort Options:

Biometrische Nachrichten-Authentisierung 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Busch, Christoph; Hartung, Daniel
Bei vielen Anwendungen ist die Integrität und Authentizität übertragener Nachrichten von Interesse. So sind zum Beispiel im Online-Banking sind die relevanten Informationen i) welches Empfänger-Konto eine Gutschrift erhält, ii) welcher Betrag dem Empfänger gutgeschrieben werden soll, iii)) welches Sender-Konto eine ...

Real-time fault-tolerant routing in high-availability multicast-aware video networks 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Messmer, Roman; Keller, Jörg
Live-videostream networks based on multimedia switches are the most recent products used in television production and distribution facilities to transport the live signal from sources like cameras or microphones to dedicated sinks like video monitors, loudspeakers and transmission lines. To switch signals from a single ...

Towards optimal sensor placement strategies for early warning systems 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Göbel, Jan; Trinius, Philipp
A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on the sensor deployment strategy used. We therefore analysed attack patterns of malicious software collected at sensors worldwide to determine ...

Extended lattice reduction experiments using the BKZ algorithm 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Schneider, Michael; Buchmann, Johannes
We present experimental results using lattice reduction algorithms. We choose the BKZ algorithm, that is the algorithm considered the strongest one in this area in practice. It is an important task to analyze the practical behaviour of lattice reduction algorithms, as the theoretical predictions are far from being ...

A study on features for the detection of copy-move forgeries 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Christlein, Vincent; Riess, Christian; Angelopoulou, Elli
Blind image forensics aims to assess image authenticity. One of the most popular families of methods from this category is the detection of copy-move forgeries. In the past years, more than 15 different algorithms have been proposed for copy-move forgery detection. So far, the efficacy of these approaches has barely been ...

Security analysis of OpenID 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Sovis, Pavol; Kohlar, Florian; Schwenk, Jörg
OpenID is a user-centric and decentralized Single Sign-On system. It enables users to sign into Relying Partiesby providing an authentication assertion from an OpenID Provider. It is supported by many leading internet companies and there are over a billion accounts capable of using OpenID. We present a security analysis ...

Collusion-secure fingerprint watermarking for real world applications 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Schäfer, Marcel; Berchtold, Waldemar; Steinebach, Martin; Zmudzinski, Sascha; Heilmann, Margareta; Katzenbeisser, Stefan
Digital transaction watermarking today is a widely accepted mechanism in multimedia security. One major threat on transaction watermarking are collusion attacks. Here multiple individualized copies of the work are mixed to produce a counterfeited or undetectable watermark. One common countermeasure is the usage of so-called ...

A malware instruction set for behavior-based analysis 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Trinius, Philipp; Willems, Carsten; Holz, Thorsten; Rieck, Konrad
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient analysis of behavior using data mining and machine learning techniques. It can be obtained automatically during analysis of malware with a ...

A parallel computing system with specialized coprocessors for cryptanalytic algorithms 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Kastl, Wolfgang; Loimayr, Thomas
In this paper we present a scalable, parallel computing system consisting of specialized processors primarily designed for the implementation of cryptanalytic algorithms. Even though the system was developed in regard to solve cryptanalytic problems, it is suitable for many other tasks which can benefit from the enormous ...

Towards secure and reliable firewall systems based on MINIX 3 

Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit Weis, Rüdiger; Schüler, Brian; Flemming, Stefan A.
Minix 3 is a real micro kernel operation system with a lot of remarkable security features. Two of the main points are size and isolation. The Minix 3 kernel is less than one thousand times the size of Linux. All drivers and the IP stack live in user land. We show a port of the netfilter framework, which leads to a system ...
  • «
  • 1
  • 2
  • 3
  • 4
  • »

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 

Discover

Author

Busch, Christoph (2)Dittmann, Jana (2)Göbel, Jan (2)Holz, Thorsten (2)Keller, Jörg (2)Kiltz, Stefan (2)Trinius, Philipp (2)Abt, Sebastian (1)Altschaffel, Robert (1)Angelopoulou, Elli (1)... View More

Subject

intrusion detection (2)BKZ (1)hermite-SVP (1)IT-forensics (1)lattice reduction (1)LLL (1)network security (1)Quellcodeanalyse (1)reactive security (1)Signaturanalyse (1)... View More

Date Issued

2010 (31)

Has File(s)

Yes (31)

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.