Sciweavers

3451 search results - page 116 / 691
» Collaborative attack modeling
Sort
View
CADE
2004
Springer
14 years 10 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
WSC
2007
14 years 16 days ago
Agent-based modeling and simulation of wildland fire suppression
Simulation of wildland fire suppression is useful to evaluate deployment plans of firefighting resources and to experiment different fire suppression strategies and tactics. Previ...
Xiaolin Hu, Yi Sun
IH
2007
Springer
14 years 4 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
ESORICS
2006
Springer
14 years 1 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 8 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto