Sciweavers

3451 search results - page 580 / 691
» Collaborative attack modeling
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
14 years 1 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
ISW
2004
Springer
14 years 1 months ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
STDBM
2004
Springer
127views Database» more  STDBM 2004»
14 years 1 months ago
Condition Evaluation for Speculative Systems: a Streaming Time Series Case
Application systems often need to react with certain actions whenever some preset conditions are satisfied. In many cases, the evaluation of these conditions takes long time, but...
Xiaoyang Sean Wang, Like Gao, Min Wang