• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,786
Next 10 →

The security impact of

by Daniel J. Bernstein, Tanja Lange, Peter Schwabe
"... a new cryptographic library ..."
Abstract - Add to MetaCart
a new cryptographic library

LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks

by Sencun Zhu , 2003
"... Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observ ..."
Abstract - Cited by 469 (22 self) - Add to MetaCart
Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated

A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract - Cited by 462 (7 self) - Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls

Measuring the information content of stock trades

by Joel Hasbrouck - Journal of Finance , 1991
"... This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE is ..."
Abstract - Cited by 469 (11 self) - Add to MetaCart
This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE

Measuring security price performance

by Stephen J. Brown, Jerold B. Warner - Journal of Financial Economics , 1980
"... Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal per ..."
Abstract - Cited by 379 (2 self) - Add to MetaCart
Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal

Security impact ratings considered harmful

by Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Price, Nelson Elhage, Geoffrey Thomas, Anders Kaseorg
"... In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. We argue that OS vendors and ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. We argue that OS vendors

CAPTCHA: Using Hard AI Problems for Security

by Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford - IN PROCEEDINGS OF EUROCRYPT , 2003
"... We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas ..."
Abstract - Cited by 331 (4 self) - Add to MetaCart
have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems

The Economic and Security Impacts on the Aviation Industry

by Da-nian Tzou, Lei Xu, Yu-jen Chen, Jun Sheng Xia
"... September 11, 2001 will always be considered a turning point in the history of America. Terrorists attacks in New York City and Washington D.C. with aircrafts, were proved to be a major catastrophe for American as well as world airline industry. The North American airspace was completely shut down f ..."
Abstract - Add to MetaCart
since that time. It’s really hard for airlines to balance their finance and get profits at this moment. The aim of this article is to explore the economic impact of September 11 from two aspects: airline and airports. An insight into the decline in air passenger demand due to September 11 is provided

On the semantic patterns of passwords and their security impact. NDSS

by Rafael Veras, Christopher Collins, Julie Thorpe , 2014
"... Abstract—We present the first framework for segmentation, semantic classification, and semantic generalization of passwords and a model that captures the semantic essence of password samples. Researchers have only touched the surface of patterns in password creation, with the semantics of passwords ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
remaining largely unexplored, leaving a gap in our understanding of their characteristics and, consequently, their security. In this paper, we begin to fill this gap by employing Natural Language Processing techniques to extract and leverage understanding of semantic patterns in passwords. The results

Soil Carbon Sequestration impacts on Global Climate Change and Food Security.

by R Lal - Science, , 2004
"... ..."
Abstract - Cited by 254 (8 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 8,786
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University