Internet Security Attacks at the Basic Levels.
Marco de VivoGabriela O. de VivoGerminal IsernPublished in: ACM SIGOPS Oper. Syst. Rev. (1998)
Keyphrases
- security mechanisms
- security threats
- security problems
- security issues
- security measures
- resource constrained
- malicious traffic
- access control
- internet banking
- computer security
- identity theft
- security vulnerabilities
- security protocols
- security requirements
- java card
- information security
- countermeasures
- cyber attacks
- smart card
- security risks
- denial of service attacks
- enterprise network
- network traffic
- stream cipher
- computer networks
- security breaches
- cryptographic algorithms
- malicious attacks
- cryptographic protocols
- fault injection
- malicious users
- insider attacks
- security flaws
- key management
- network security
- information leakage
- intrusion prevention
- internet users
- watermarking scheme
- chosen plaintext
- advanced encryption standard
- buffer overflow
- electronic payment
- unauthorized access
- cloud computing
- security policies