Towse Publishing Company

Displaying 1-9 of 9 results

  • White Papers // Nov 2012

    Broadband Transformation Optics Devices

    Current interest in electromagnetic meta-materials has been motivated by recent work on superlenses, cloaking and transformation optics. This interest has been followed by considerable efforts aimed at introduction of meta-material structures that could be realized experimentally. Unfortunately, it appears difficult to develop meta-materials with low-loss, broadband performance. The difficulties are...

    Provided By Towse Publishing Company

  • White Papers // May 2012

    Towards Effective Defense Against Pollution Attacks on Network Coding

    Network coding provides a promising alternative to the traditional store-and-forward transmission paradigm. For the system using random linear network coding, the adversary could inject corrupted messages into the networks by compromising the network nodes, which is known as the pollution attack. Corrupted messages injected by the adversary, if undetected, could...

    Provided By Towse Publishing Company

  • White Papers // May 2012

    A Novel Architecture Against False Data Injection Attacks in Smart Grid

    Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. Cyber attacks against data readmission system threaten the security of smart grid. Hence, identifying and preventing the false data injection as early as possible becomes a critical issue. However, there...

    Provided By Towse Publishing Company

  • White Papers // Mar 2012

    A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems

    In Cyber-Physical Networked Systems (CPNS), attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However,...

    Provided By Towse Publishing Company

  • White Papers // Feb 2012

    A Novel Network Delay Based Side-Channel Attack: Modeling and Defense

    Information leakage via side channels has become a primary security threat to encrypted web traffic. Existing side channel attacks and corresponding countermeasures focus primarily on packet length, packet timing, web object size and web flow size. However, the authors found that encrypted web traffic can also leak information via network...

    Provided By Towse Publishing Company

  • White Papers // Jul 2011

    Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery

    Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by various parties. To counter this blocking, Tor introduced nonpublic bridges as the first-hop relay into its core network. In this paper, the authors analyzed the effectiveness...

    Provided By Towse Publishing Company

  • White Papers // Jan 2011

    Decision Factors for the Adoption and Continued Use of Online Direct Sales Channels Among SMEs

    Although more and more Small and Medium-sized Enterprises (SMEs) use the Internet for business purposes, few of them have adopted the Internet as an Online Direct Sales Channel (ODSC). Among those that do use the ODSC, some end up abandoning it after adoption. This study explores a few critical factors...

    Provided By Towse Publishing Company

  • White Papers // Nov 2009

    Accessible Privacy and Security: A Universally Usable Human-Interaction Proof Tool

    Despite growing interest in designing usable systems for managing privacy and security, recent efforts have generally failed to address the needs of users with disabilities. As security and privacy tools often rely upon subtle visual cues or other potentially inaccessible indicators, users with perceptual limitations might find such tools particularly...

    Provided By Towse Publishing Company

  • White Papers // Apr 2008

    Challenges in Universally Usable Privacy and Security

    Accessibility concerns compound the already-considerable difficulties of building systems that provide usable privacy and security. In addition to facing common concerns regarding the semantics of privacy and security tools, people with disabilities face accessibility obstacles, such as the inaccessibility of CAPTCHAs, phishing toolbars, verification images, and other displays that rely...

    Provided By Towse Publishing Company

  • White Papers // Jul 2011

    Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery

    Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by various parties. To counter this blocking, Tor introduced nonpublic bridges as the first-hop relay into its core network. In this paper, the authors analyzed the effectiveness...

    Provided By Towse Publishing Company

  • White Papers // Feb 2012

    A Novel Network Delay Based Side-Channel Attack: Modeling and Defense

    Information leakage via side channels has become a primary security threat to encrypted web traffic. Existing side channel attacks and corresponding countermeasures focus primarily on packet length, packet timing, web object size and web flow size. However, the authors found that encrypted web traffic can also leak information via network...

    Provided By Towse Publishing Company

  • White Papers // Mar 2012

    A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems

    In Cyber-Physical Networked Systems (CPNS), attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However,...

    Provided By Towse Publishing Company

  • White Papers // May 2012

    Towards Effective Defense Against Pollution Attacks on Network Coding

    Network coding provides a promising alternative to the traditional store-and-forward transmission paradigm. For the system using random linear network coding, the adversary could inject corrupted messages into the networks by compromising the network nodes, which is known as the pollution attack. Corrupted messages injected by the adversary, if undetected, could...

    Provided By Towse Publishing Company

  • White Papers // May 2012

    A Novel Architecture Against False Data Injection Attacks in Smart Grid

    Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. Cyber attacks against data readmission system threaten the security of smart grid. Hence, identifying and preventing the false data injection as early as possible becomes a critical issue. However, there...

    Provided By Towse Publishing Company

  • White Papers // Nov 2012

    Broadband Transformation Optics Devices

    Current interest in electromagnetic meta-materials has been motivated by recent work on superlenses, cloaking and transformation optics. This interest has been followed by considerable efforts aimed at introduction of meta-material structures that could be realized experimentally. Unfortunately, it appears difficult to develop meta-materials with low-loss, broadband performance. The difficulties are...

    Provided By Towse Publishing Company

  • White Papers // Jan 2011

    Decision Factors for the Adoption and Continued Use of Online Direct Sales Channels Among SMEs

    Although more and more Small and Medium-sized Enterprises (SMEs) use the Internet for business purposes, few of them have adopted the Internet as an Online Direct Sales Channel (ODSC). Among those that do use the ODSC, some end up abandoning it after adoption. This study explores a few critical factors...

    Provided By Towse Publishing Company

  • White Papers // Apr 2008

    Challenges in Universally Usable Privacy and Security

    Accessibility concerns compound the already-considerable difficulties of building systems that provide usable privacy and security. In addition to facing common concerns regarding the semantics of privacy and security tools, people with disabilities face accessibility obstacles, such as the inaccessibility of CAPTCHAs, phishing toolbars, verification images, and other displays that rely...

    Provided By Towse Publishing Company

  • White Papers // Nov 2009

    Accessible Privacy and Security: A Universally Usable Human-Interaction Proof Tool

    Despite growing interest in designing usable systems for managing privacy and security, recent efforts have generally failed to address the needs of users with disabilities. As security and privacy tools often rely upon subtle visual cues or other potentially inaccessible indicators, users with perceptual limitations might find such tools particularly...

    Provided By Towse Publishing Company