Sciweavers

12183 search results - page 21 / 2437
» Computers under Attacks!
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ACSAC
2006
IEEE
14 years 3 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
EUROCRYPT
2004
Springer
14 years 3 months ago
Hash Function Balance and Its Impact on Birthday Attacks
Textbooks tell us that a birthday attack on a hash function h with range size r requires r1/2 trials (hash computations) to find a collision. But this is quite misleading, being t...
Mihir Bellare, Tadayoshi Kohno
AAECC
2009
Springer
110views Algorithms» more  AAECC 2009»
14 years 1 months ago
Novel Efficient Certificateless Aggregate Signatures
We propose a new efficient certificateless aggregate signature scheme which has the advantages of both aggregate signatures and certificateless cryptography. The scheme is proven e...
Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang
ICNP
2009
IEEE
14 years 4 months ago
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks
—Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, ...
Alexander W. Min, Kang G. Shin, Xin Hu