Attributes | Values |
---|
rdf:type
| |
Description
| - This software was developed within the POSTDOC?09 project of the University of West Bohemia. The software presents an additional security measure for a networking communication via the HTTP protocol. Using steganography and encryption, the digital signature, it embeds additional security elements into an existing communication flow. These elements allow detection of a possible attack on the communication. Unauthorized modification of the transmission is considered as the attack. The software runs independently on used web browser and server; no specific software equipment is needed. The software does not limit the existing communication. The distribution package includes source code, binaries for MS Windows platform and instructions on use.
- This software was developed within the POSTDOC?09 project of the University of West Bohemia. The software presents an additional security measure for a networking communication via the HTTP protocol. Using steganography and encryption, the digital signature, it embeds additional security elements into an existing communication flow. These elements allow detection of a possible attack on the communication. Unauthorized modification of the transmission is considered as the attack. The software runs independently on used web browser and server; no specific software equipment is needed. The software does not limit the existing communication. The distribution package includes source code, binaries for MS Windows platform and instructions on use. (en)
|
Title
| - SNIH/UP: Detecting Unauthorized Modification of HTTP Communication via Steganography
- SNIH/UP: Detecting Unauthorized Modification of HTTP Communication via Steganography (en)
|
skos:prefLabel
| - SNIH/UP: Detecting Unauthorized Modification of HTTP Communication via Steganography
- SNIH/UP: Detecting Unauthorized Modification of HTTP Communication via Steganography (en)
|
skos:notation
| - RIV/49777513:23520/09:00502480!RIV10-MSM-23520___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/49777513:23520/09:00502480
|
http://linked.open...terniIdentifikace
| - Ver 0.9;Win32; Feb 2, 2010
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - encryption; steganography; attack detection; http; communication (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open.../licencniPoplatek
| |
http://linked.open...okalizaceVysledku
| |
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...echnickeParametry
| - ZČU, Univerzitní 8, Plzeň 306 14, Prof. Ing. Jiří Šafařík, CSc. tel.: 377 63 2439. Výstupem je záznam o probíhající HTTP komunikaci, která obsahuje informace o výsledku průběžného ověřování její autentičnosti.
|
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...avai/riv/vlastnik
| |
http://linked.open...itiJinymSubjektem
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |