CS Store Search
Displaying 1-4 out of 4 total
Guaranteeing the Authenticity of Location Information
IEEE Pervasive Computing
By Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho
Issue Date:July 2008
Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is ...
Search Engines as a Security Threat
By Julio César Hernández, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Issue Date:October 2001
<p>Search engines index a huge number of Web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network.</p><p>Furth...
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
IEEE Transactions on Dependable and Secure Computing
By Juan E. Tapiador,Agustin Orfila,Arturo Ribagorda,Benjamin Ramos
Issue Date:September 2013
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to de...
Extended electronic signature policies
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Ana I. Gonzalez-Tablas, Arturo Ribagorda, Benjamin Ramos, Jorge L. Hernandez-Ardieta
Issue Date:October 2009
A signature policy collects the rules to create and validate electronic signatures under which they become binding in a particular transactional context. These policies have been widely adopted to enforce the binding property of signatures in business scen...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.